First published: Thu Feb 11 2021(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11653.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Ac2100 Firmware | <1.2.0.76 | |
Netgear Ac2100 | ||
Netgear Ac2400 Firmware | <1.2.0.76 | |
Netgear Ac2400 | ||
Netgear Ac2600 Firmware | <1.2.0.76 | |
Netgear Ac2600 | ||
Netgear R6700 Firmware | <1.2.0.76 | |
NETGEAR R6700 | =v2 | |
Netgear R6800 Firmware | <1.2.0.76 | |
Netgear R6800 | ||
Netgear R6900 Firmware | <1.2.0.76 | |
Netgear R6900 | =v2 | |
Netgear R7200 Firmware | <1.2.0.76 | |
Netgear R7200 | ||
Netgear R7350 Firmware | <1.2.0.76 | |
Netgear R7350 | ||
Netgear R7400 Firmware | <1.2.0.76 | |
Netgear R7400 | ||
Netgear R7450 Firmware | <1.2.0.76 | |
NETGEAR R7450 | ||
Netgear R6220 Firmware | <1.1.0.104 | |
NETGEAR R6220 | ||
Netgear R6230 Firmware | <1.1.0.104 | |
Netgear R6230 | ||
Netgear R6260 Firmware | <1.1.0.78 | |
NETGEAR R6260 | ||
Netgear R6330 Firmware | <1.1.0.78 | |
Netgear R6330 | ||
Netgear R6350 Firmware | <1.1.0.78 | |
Netgear R6350 | ||
Netgear R6850 Firmware | <1.1.0.78 | |
Netgear R6850 | ||
Netgear R6120 Firmware | <1.0.0.76 | |
NETGEAR R6120 | ||
Netgear R6020 Firmware | <1.0.0.48 | |
NETGEAR R6020 | ||
Netgear R6080 Firmware | <1.0.0.48 | |
Netgear R6080 | ||
NETGEAR Multiple Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27867 is a command injection vulnerability in NETGEAR Multiple Routers that allows network-adjacent attackers to execute arbitrary code on affected installations.
The routers affected by CVE-2020-27867 include NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400.
Yes, authentication is required to exploit CVE-2020-27867.
CVE-2020-27867 has a severity score of 6.8, which is considered high.
To fix CVE-2020-27867, it is recommended to update the firmware of the affected routers to a version that includes the security patch from NETGEAR.