First published: Tue Jul 28 2020(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of firmware updates. The issue results from the lack of proper validation of the firmware image prior to performing an upgrade. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9648.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear R6700 Firmware | =1.0.4.84_10.0.58 | |
NETGEAR R6700v1 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10926 is rated as high severity due to the risk of arbitrary code execution by unauthenticated attackers.
To fix CVE-2020-10926, update your NETGEAR R6700 router firmware to the latest version provided by the manufacturer.
CVE-2020-10926 affects NETGEAR R6700 routers running firmware version 1.0.4.84_10.0.58 and earlier.
The attack vector for CVE-2020-10926 is network-adjacent, meaning that an attacker must be on the same network to exploit this vulnerability.
No, authentication is not required to exploit CVE-2020-10926, making it especially dangerous.