This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R6700v3 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-15854 is considered a critical vulnerability as it allows unauthenticated attackers to bypass authentication on NETGEAR R6700v3 routers.
To fix ZDI-CAN-15854, users should update their firmware to the latest version provided by NETGEAR.
ZDI-CAN-15854 affects installations of NETGEAR R6700v3 routers that have not been patched.
ZDI-CAN-15854 is associated with network-adjacent attacks that exploit authentication bypass vulnerabilities.
No, authentication is not required to exploit the ZDI-CAN-15854 vulnerability.