This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.

Project Subscriptions

Vendors Products
Netgear Subscribe
Cbk40 Firmware Subscribe
Cbk43 Firmware Subscribe
Cbr40 Firmware Subscribe
Ex6200 Firmware Subscribe
Ex7700 Firmware Subscribe
Ex8000 Firmware Subscribe
Rbk12 Firmware Subscribe
Rbk13 Firmware Subscribe
Rbk14 Firmware Subscribe
Rbk15 Firmware Subscribe
Rbk20 Router Firmware Subscribe
Rbk20 Satellite Firmware Subscribe
Rbk20w Firmware Subscribe
Rbk22 Router Firmware Subscribe
Rbk22 Satellite Firmware Subscribe
Rbk23 Router Firmware Subscribe
Rbk23 Satellite Firmware Subscribe
Rbk23w Firmware Subscribe
Rbk30 Firmware Subscribe
Rbk33 Firmware Subscribe
Rbk40 Router Firmware Subscribe
Rbk40 Satellite Firmware Subscribe
Rbk43 Router Firmware Subscribe
Rbk43 Satellite Firmware Subscribe
Rbk43s Router Firmware Subscribe
Rbk43s Satellite Firmware Subscribe
Rbk44 Router Firmware Subscribe
Rbk44 Satellite Firmware Subscribe
Rbk50 Firmware Subscribe
Rbk50v Firmware Subscribe
Rbk52w Firmware Subscribe
Rbr10 Firmware Subscribe
Rbr20 Firmware Subscribe
Rbr40 Firmware Subscribe
Rbr50 Firmware Subscribe
Rbs10 Firmware Subscribe
Rbs20 Firmware Subscribe
Rbs40 Firmware Subscribe
Rbs50 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-20354 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2024-08-04T16:25:43.503Z

Reserved: 2020-10-27T00:00:00

Link: CVE-2020-27861

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-12T00:15:12.500

Modified: 2024-11-21T05:21:57.107

Link: CVE-2020-27861

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses