8.8
CWE
78
Advisory Published
Updated
Advisory Published

CVE-2020-27861: NETGEAR Orbi UA_Parser Host Name Command Injection Remote Code Execution Vulnerability

First published: Thu Feb 11 2021(Updated: )

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.

Credit: zdi-disclosures@trendmicro.com

Affected SoftwareAffected VersionHow to fix
NETGEAR Orbi
NETGEAR CBK40 firmware<2.6.1.38
Netgear CBK40
NETGEAR CBK43 Firmware<2.6.1.38
Netgear CBK43
NETGEAR CBR40 firmware<2.6.1.38
Netgear CBR40
NETGEAR EX6200 firmware<1.0.1.82
NETGEAR EX6200=v2
NETGEAR EX7700<1.0.0.210
NETGEAR EX7700
NETGEAR EX8000<1.0.1.224
NETGEAR EX8000
NETGEAR RBK12 firmware<2.6.1.44
NETGEAR RBK12 firmware
NETGEAR rbk13 firmware<2.6.1.44
NETGEAR rbk13 firmware
NETGEAR rbk14 firmware<2.6.1.44
NETGEAR rbk14 firmware
NETGEAR RBK15 Firmware<2.6.1.44
NETGEAR RBK15 Firmware
NETGEAR RBR10 firmware<2.6.1.44
NETGEAR RBR10 firmware
NETGEAR RBS10<2.6.1.44
NETGEAR RBS10 firmware
NETGEAR RBK20<2.6.1.36
NETGEAR Nighthawk Mesh WiFi 6 System (RBK20)
NETGEAR RBK23 Firmware<2.6.1.36
NETGEAR RBK23 Firmware
NETGEAR RBK20 Router Firmware<2.6.1.36
NETGEAR RBK20 Satellite Firmware<2.6.1.38
NETGEAR RBK20 firmware
NETGEAR RBK22 Router Firmware<2.6.1.36
NETGEAR RBK22 Satellite Firmware<2.6.1.38
NETGEAR RBK22 firmware
NETGEAR RBK23 Firmware<2.6.1.36
NETGEAR RBK23 Satellite Firmware<2.6.1.38
NETGEAR Orbi RBK23
NETGEAR RBR20<2.6.1.36
NETGEAR RBR20
NETGEAR RBS20 firmware<2.6.1.38
NETGEAR RBS20 firmware
NETGEAR RBK30 Firmware<2.6.1.36
NETGEAR RBK30 Firmware
NETGEAR rbk33 firmware<2.6.1.36
NETGEAR RBK33
NETGEAR rbk40 router firmware<2.6.1.36
NETGEAR rbk40 satellite firmware<2.6.1.38
NETGEAR RBK40 firmware
NETGEAR RBK43S Firmware<2.6.1.36
NETGEAR RBK43S Satellite Firmware<2.6.1.38
NETGEAR RBK43 Router Firmware
NETGEAR RBK43S<2.6.1.36
NETGEAR RBK43S Firmware<2.6.1.38
NETGEAR RBK43S Firmware
NETGEAR RBK44 Satellite Firmware<2.6.1.36
NETGEAR RBK44 Satellite Firmware<2.6.1.38
NETGEAR RBK44 Satellite Firmware
NETGEAR CBR40 firmware<2.6.1.36
NETGEAR RBR40 firmware
NETGEAR RBS40 firmware<2.6.1.38
NETGEAR RBS40 firmware
NETGEAR RBK50 firmware<2.6.1.40
NETGEAR RBK50
NETGEAR RBK50V firmware<2.6.1.40
NETGEAR RBK50V firmware
NETGEAR rbk52w firmware<2.6.1.40
NETGEAR RBK52
NETGEAR RBR50 firmware<2.6.1.40
NETGEAR RBR50 firmware
NETGEAR RBS50 firmware<2.6.1.40
NETGEAR RBS50

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2020-27861?

    CVE-2020-27861 is classified as a high severity vulnerability allowing unauthenticated remote code execution.

  • How do I fix CVE-2020-27861?

    To fix CVE-2020-27861, update the firmware of your NETGEAR Orbi routers and extenders to the latest version provided by NETGEAR.

  • What devices are affected by CVE-2020-27861?

    CVE-2020-27861 affects several NETGEAR Orbi models and associated firmware versions, including Orbi RBK series routers.

  • Can CVE-2020-27861 be exploited remotely?

    Yes, CVE-2020-27861 can be exploited remotely by network-adjacent attackers without authentication.

  • What type of vulnerability is CVE-2020-27861?

    CVE-2020-27861 is a command injection vulnerability in the UA_Parser utility within NETGEAR Orbi routers.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203