ID

VAR-202412-2475


CVE

CVE-2024-12988


TITLE

of netgear  R6900P  firmware and  R7000P  Out-of-bounds write vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-024295

DESCRIPTION

A vulnerability has been found in Netgear R6900P and R7000P 1.3.3.154 and classified as critical. Affected by this vulnerability is the function sub_16C4C of the component HTTP Header Handler. The manipulation of the argument Host leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. of netgear R6900P firmware and R7000P An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. NETGEAR R6900P and R7000P are wireless routers launched by NETGEAR, providing high-speed Internet connection and network management functions. Attackers can exploit this vulnerability to cause the service to crash

Trust: 2.16

sources: NVD: CVE-2024-12988 // JVNDB: JVNDB-2024-024295 // CNVD: CNVD-2025-13417

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-13417

AFFECTED PRODUCTS

vendor:netgearmodel:r6900pscope:eqversion:1.3.3.154

Trust: 1.6

vendor:netgearmodel:r7000pscope:eqversion:1.3.3.154

Trust: 1.0

vendor:ネットギアmodel:r6900pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7000pscope: - version: -

Trust: 0.8

vendor:netgearmodel:r7000pscope:eqversion:v1.3.3.154

Trust: 0.6

sources: CNVD: CNVD-2025-13417 // JVNDB: JVNDB-2024-024295 // NVD: CVE-2024-12988

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2024-12988
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2024-12988
value: HIGH

Trust: 1.0

OTHER: JVNDB-2024-024295
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-13417
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2024-12988
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2024-024295
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-13417
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2024-12988
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2024-12988
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2024-024295
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-13417 // JVNDB: JVNDB-2024-024295 // NVD: CVE-2024-12988 // NVD: CVE-2024-12988

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-120

Trust: 1.0

problemtype:Buffer error (CWE-119) [ others ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-024295 // NVD: CVE-2024-12988

EXTERNAL IDS

db:NVDid:CVE-2024-12988

Trust: 3.2

db:VULDBid:289381

Trust: 2.4

db:JVNDBid:JVNDB-2024-024295

Trust: 0.8

db:CNVDid:CNVD-2025-13417

Trust: 0.6

sources: CNVD: CNVD-2025-13417 // JVNDB: JVNDB-2024-024295 // NVD: CVE-2024-12988

REFERENCES

url:https://vuldb.com/?id.289381

Trust: 2.4

url:https://github.com/physicszq/routers/tree/main/netgear/1.3.3.154

Trust: 1.8

url:https://vuldb.com/?submit.462781

Trust: 1.8

url:https://www.netgear.com/

Trust: 1.8

url:https://www.netgear.com/about/eos/

Trust: 1.8

url:https://vuldb.com/?ctiid.289381

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2024-12988

Trust: 0.8

sources: CNVD: CNVD-2025-13417 // JVNDB: JVNDB-2024-024295 // NVD: CVE-2024-12988

SOURCES

db:CNVDid:CNVD-2025-13417
db:JVNDBid:JVNDB-2024-024295
db:NVDid:CVE-2024-12988

LAST UPDATE DATE

2025-06-26T23:20:50.288000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-13417date:2025-06-25T00:00:00
db:JVNDBid:JVNDB-2024-024295date:2025-05-29T02:26:00
db:NVDid:CVE-2024-12988date:2025-05-28T20:19:05.267

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-13417date:2025-06-25T00:00:00
db:JVNDBid:JVNDB-2024-024295date:2025-05-29T00:00:00
db:NVDid:CVE-2024-12988date:2024-12-27T17:15:08.130