Bug Fixes:

  1. [PSV-2018-0228] Router blank password accepted
  2. [PSV-2017-2300][reverse engineering issue scan] Post-Auth RCE:
  3. usb_remote_invite.cgi - Password parameter
  4. [PSV-2018-0323] WAN DNS SOAP Stack Buffer Overflow [POST AUTH]
  5. [PSV-2018-0253] USB Device CGI Stack Buffer Overflow
  6. [PSV-2018-0244] Stored XSS issue in http://192.168.1.1/FW_remote.htm through
  7. "http_rmport" variable
  8. [PSV-2017-2449] Broken Auth and Session Management
  9. [PSV-2018-0378] Stack-based buffer overflow in "httpd" via "usb_wan_http_port"
  10. [PSV-2018-0242] Stored XSS issue in http://192.168.1.1/USB_adv.htm [^] through
  11. "http_via_port" variable
  12. [PSV-2018-0379] Stack-based buffer overflow in "httpd" via "usb_wan_ftp_port"
  13. [PSV-2018-0243] Stored XSS issue in http://192.168.1.1/USB_adv.htm [^] through
  14. "ftp_via_port" variable
  15. [PSV-2018-0376] Firmware http Service Command Injection Vulnerability
  16. [PSV-2018-0377] Stack-based buffer overflow in "httpd"
  17. [PSV-2018-0258] WLANConfiguration SOAP Stack Buffer Overflow -- Additional Patch

Download Link : http://www.downloads.netgear.com/files/GDC/DC112A/DC112A-V1.0.0.42_1.0.60.zip

Firmware Update Instructions:

To update your AirCard smart cradle’s firmware, follow the instructions in your AirCard smart cradle’s user manual. To view your AirCard smart cradle’s user manual, visit https://www.netgear.com/support/product/DC112A.aspx#docs