This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R6700v3 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-22-518 is considered critical due to the possibility of authentication bypass.
To fix ZDI-22-518, users should update to the latest firmware version provided by NETGEAR for R6700v3 routers.
ZDI-22-518 can be exploited by network-adjacent attackers who can bypass authentication without any credentials.
ZDI-22-518 specifically affects NETGEAR R6700v3 routers.
No, authentication is not required to exploit the vulnerability ZDI-22-518.