This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Nighthawk R7800. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the rc_service parameter provided to apply_bind.cgi. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R7800 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-21-249 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix ZDI-21-249, update the firmware of your NETGEAR Nighthawk R7800 to the latest version released by NETGEAR.
The vulnerability ZDI-21-249 affects installations of the NETGEAR Nighthawk R7800 router.
No, ZDI-21-249 requires authentication, but the existing authentication mechanism can be bypassed.
ZDI-21-249 allows network-adjacent attackers to execute arbitrary code on affected devices.