First published: Mon Mar 29 2021(Updated: )
This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ReportTemplateController class. When parsing the path parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12123.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR ProSAFE Network Management System | =1.6.0.26 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this NETGEAR ProSAFE Network Management System vulnerability is CVE-2021-27272.
The severity rating of CVE-2021-27272 is high with a severity value of 7.1.
The affected software of CVE-2021-27272 is NETGEAR ProSAFE Network Management System 1.6.0.26.
CVE-2021-27272 is a vulnerability in NETGEAR ProSAFE Network Management System that allows remote attackers to delete arbitrary files with bypassed authentication.
The Common Weakness Enumeration (CWE) of CVE-2021-27272 is CWE-22.