This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the name or email field provided to libreadycloud.so. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R6700v3 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-15874 is a critical vulnerability that allows network-adjacent attackers to execute arbitrary code.
To fix ZDI-CAN-15874, apply the latest firmware update released by NETGEAR for the R6700v3 router.
ZDI-CAN-15874 affects NETGEAR R6700v3 routers with vulnerable firmware installations.
ZDI-CAN-15874 allows attackers to execute arbitrary code on affected NETGEAR R6700v3 routers.
Yes, ZDI-CAN-15874 requires authentication; however, the existing mechanism can be bypassed.