Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50995: n/a

0
Medium
VulnerabilityCVE-2024-50995cvecve-2024-50995
Published: Tue Nov 05 2024 (11/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-50995 is a medium severity stack overflow vulnerability in the Netgear R8500 router firmware version 1. 0. 2. 160. It arises from improper handling of the share_name parameter in the usb_remote_smb_conf. cgi endpoint. An attacker with local network access and low privileges can send a crafted POST request to trigger a stack overflow, resulting in a Denial of Service (DoS) condition. This vulnerability does not impact confidentiality or integrity but can disrupt availability by crashing the device or its services. No user interaction is required, but some level of privilege is necessary. There are currently no known exploits in the wild, and no patches have been published yet.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:13:19 UTC

Technical Analysis

CVE-2024-50995 is a stack-based buffer overflow vulnerability identified in the Netgear R8500 router firmware version 1.0.2.160. The flaw exists in the usb_remote_smb_conf.cgi CGI script, specifically in the handling of the share_name parameter. When processing a crafted POST request containing a specially constructed share_name value, the router's software fails to properly validate input length, leading to a stack overflow condition (CWE-120). This overflow can cause the router to crash or reboot, resulting in a Denial of Service (DoS). The vulnerability requires an attacker to have local network access and low privileges (PR:L), but no user interaction is needed (UI:N). The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local or VPN network segment. The CVSS v3.1 base score is 5.7, reflecting medium severity due to the impact on availability only, with no confidentiality or integrity compromise. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability highlights the risk of insufficient input validation in embedded device web interfaces, which can be exploited to disrupt network infrastructure.

Potential Impact

The primary impact of CVE-2024-50995 is a Denial of Service condition on affected Netgear R8500 routers. This can disrupt network connectivity and availability for home users, small businesses, or enterprise environments relying on these devices. The DoS may cause router crashes or reboots, leading to temporary loss of internet access or internal network services. While the vulnerability does not allow data theft or device takeover, the loss of availability can affect business operations, remote work, and critical communications. Organizations with many deployed R8500 units could face widespread network interruptions if exploited at scale. The requirement for local network access limits remote exploitation but does not eliminate risk in environments with untrusted internal users or compromised devices. The absence of known exploits reduces immediate risk, but the lack of patches means the vulnerability remains exploitable once discovered by attackers.

Mitigation Recommendations

To mitigate CVE-2024-50995, organizations should first verify if they are using the Netgear R8500 router with firmware version 1.0.2.160. Until an official patch is released, network administrators should restrict access to the router's management interfaces, especially the usb_remote_smb_conf.cgi endpoint, by implementing strong network segmentation and firewall rules that limit access to trusted hosts only. Disable or restrict SMB sharing features if not required, as this reduces the attack surface. Monitor network traffic for unusual POST requests targeting the vulnerable CGI script. Employ network intrusion detection systems (NIDS) with custom signatures to detect attempts to exploit the share_name parameter. Regularly check Netgear's official channels for firmware updates and apply patches promptly once available. Additionally, consider replacing vulnerable devices with models that have active security support if patching is delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ba4b7ef31ef0b557797

Added to database: 2/25/2026, 9:37:40 PM

Last enriched: 2/26/2026, 1:13:19 AM

Last updated: 2/26/2026, 9:39:22 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats