This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR Orbi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-1430 is critical due to its potential for remote code execution without authentication.
To fix ZDI-20-1430, update your NETGEAR Orbi routers to the latest firmware version provided by the manufacturer.
ZDI-20-1430 affects installations of NETGEAR Orbi routers that have not been patched against this vulnerability.
ZDI-20-1430 enables network-adjacent attackers to execute arbitrary commands on the affected NETGEAR Orbi routers.
No, authentication is not required to exploit ZDI-20-1430, making it highly vulnerable to attacks.