First published: Tue Jul 28 2020(Updated: )
This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-9647.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear R6700 Firmware | =1.0.4.84_10.0.58 | |
NETGEAR R6700v1 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10925 has been rated as a medium severity vulnerability.
To fix CVE-2020-10925, update the firmware of your NETGEAR R6700 router to a version that is not affected by this vulnerability.
CVE-2020-10925 can be exploited by network-adjacent attackers to compromise the integrity of downloaded information.
No, authentication is not required to exploit CVE-2020-10925.
CVE-2020-10925 specifically affects NETGEAR R6700 firmware version 1.0.4.84_10.0.58.