This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR AC1200 Smart WiFi Router. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of path strings. By inserting a null byte into the path, the user can skip most authentication checks. An attacker can leverage this vulnerability to bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR AC1200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-8616 is considered critical due to the ability of network-adjacent attackers to bypass authentication.
To fix ZDI-CAN-8616, update the NETGEAR AC1200 Smart WiFi Router to the latest firmware that addresses this vulnerability.
The vulnerability ZDI-CAN-8616 affects installations of the NETGEAR AC1200 Smart WiFi Router.
ZDI-CAN-8616 is vulnerable to authentication bypass attacks from network-adjacent attackers.
No, authentication is not required to exploit the ZDI-CAN-8616 vulnerability.