This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR Orbi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-11076 is high due to its ability to allow remote code execution without authentication.
To fix ZDI-CAN-11076, you should update your NETGEAR Orbi router to the latest firmware version provided by NETGEAR.
ZDI-CAN-11076 affects installations of NETGEAR Orbi routers that utilize the vulnerable UA_Parser utility.
Yes, ZDI-CAN-11076 can be exploited remotely by network-adjacent attackers.
No, ZDI-CAN-11076 can be exploited without any authentication.