First published: Mon Feb 10 2020(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR AC1200 R6220 Firmware version 1.1.0.86 Smart WiFi Router. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of path strings. By inserting a null byte into the path, the user can skip most authentication checks. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-8616.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR AC1200 | ||
NETGEAR R6220 | =1.1.0.86 | |
NETGEAR AC1200 R6220 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-17137 is considered high due to the potential for network-adjacent attackers to bypass authentication.
To fix CVE-2019-17137, update the NETGEAR AC1200 R6220 firmware to the latest version provided by NETGEAR.
CVE-2019-17137 affects the NETGEAR AC1200 R6220 with firmware version 1.1.0.86.
CVE-2019-17137 requires network-adjacent access, meaning an attacker must be on the same local network to exploit it.
No, CVE-2019-17137 does not require authentication, allowing attackers to exploit the vulnerability easily.