First published: Thu Feb 04 2021(Updated: )
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SOAP API endpoint, which listens on TCP port 80 by default. The issue results from the lack of proper access control. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-11559.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R7450 | ||
Netgear Ac2100 Firmware | <1.2.0.76 | |
Netgear Ac2100 | ||
Netgear Ac2400 Firmware | <1.2.0.76 | |
Netgear Ac2400 | ||
Netgear Ac2600 Firmware | <1.2.0.76 | |
Netgear Ac2600 | ||
Netgear R6700 Firmware | <1.2.0.76 | |
NETGEAR R6700 | =v2 | |
Netgear R6800 Firmware | <1.2.0.76 | |
Netgear R6800 | ||
Netgear R6900 Firmware | <1.2.0.76 | |
Netgear R6900 | =v2 | |
Netgear R7200 Firmware | <1.2.0.76 | |
Netgear R7200 | ||
Netgear R7350 Firmware | <1.2.0.76 | |
Netgear R7350 | ||
Netgear R7400 Firmware | <1.2.0.76 | |
Netgear R7400 | ||
Netgear R7450 Firmware | <1.2.0.76 | |
NETGEAR R7450 | ||
Netgear R6220 Firmware | <1.1.0.104 | |
NETGEAR R6220 | ||
Netgear R6230 Firmware | <1.1.0.104 | |
Netgear R6230 | ||
Netgear R6260 Firmware | <1.1.0.78 | |
NETGEAR R6260 | ||
Netgear R6330 Firmware | <1.1.0.78 | |
Netgear R6330 | ||
Netgear R6350 Firmware | <1.1.0.78 | |
Netgear R6350 | ||
Netgear R6850 Firmware | <1.1.0.78 | |
Netgear R6850 | ||
Netgear R6120 Firmware | <1.0.0.76 | |
NETGEAR R6120 | ||
Netgear R6020 Firmware | <1.0.0.48 | |
NETGEAR R6020 | ||
Netgear R6080 Firmware | <1.0.0.48 | |
Netgear R6080 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-27873.
The severity of CVE-2020-27873 is medium.
NETGEAR R7450 1.2.0.62_1.0.1 routers are affected.
No, authentication is not required to exploit this vulnerability.
There is currently no patch available. Follow the recommendations in the NETGEAR security advisory.