First published: Tue Jul 28 2020(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the encryption of firmware update images. The issue results from the use of an inappropriate encryption algorithm. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-9649.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R6700 firmware | =1.0.4.84_10.0.58 | |
NETGEAR R6700v1 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10927 has a high severity rating due to its potential for remote code execution.
To fix CVE-2020-10927, users should update their NETGEAR R6700 routers to the latest firmware version as provided by the manufacturer.
CVE-2020-10927 affects installations of NETGEAR R6700 firmware version 1.0.4.84_10.0.58.
Yes, CVE-2020-10927 can be exploited by network-adjacent attackers without requiring authentication.
CVE-2020-10927 allows attackers to execute arbitrary code on vulnerable NETGEAR R6700 routers.