This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6120, R6080, R6260, R6220, R6020, JNR3210, and WNR2020 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-10754 is considered critical due to its ability to allow unauthenticated attackers to access sensitive information.
To mitigate ZDI-CAN-10754, users should apply the latest firmware updates provided by NETGEAR for the affected router models.
ZDI-CAN-10754 affects various NETGEAR router models including R6120, R6080, R6260, R6220, R6020, JNR3210, and WNR2020.
No, ZDI-CAN-10754 requires network-adjacent access for exploitation, meaning the attacker must be on the same network.
No, authentication is not required to exploit ZDI-CAN-10754, allowing unauthorized access to sensitive information.