First published: Tue Jul 28 2020(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of string table file uploads. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the web server. Was ZDI-CAN-9767.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear R6700 Firmware | =1.0.4.84_10.0.58 | |
NETGEAR R6700v1 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10928 has a high severity rating due to its ability to allow arbitrary code execution by unauthenticated attackers.
To fix CVE-2020-10928, update your NETGEAR R6700 router to the latest firmware version provided by NETGEAR.
CVE-2020-10928 allows an attacker to execute arbitrary code, potentially compromising the device and the network it is connected to.
No, authentication is not required to exploit CVE-2020-10928, making it particularly dangerous.
CVE-2020-10928 specifically affects NETGEAR R6700 router firmware version 1.0.4.84_10.0.58.