This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11355.

Project Subscriptions

Vendors Products
Netgear Subscribe
Ac2100 Firmware Subscribe
Ac2400 Firmware Subscribe
Ac2600 Firmware Subscribe
R6020 Firmware Subscribe
R6080 Firmware Subscribe
R6120 Firmware Subscribe
R6220 Firmware Subscribe
R6230 Firmware Subscribe
R6260 Firmware Subscribe
R6330 Firmware Subscribe
R6350 Firmware Subscribe
R6700 Firmware Subscribe
R6800 Firmware Subscribe
R6850 Firmware Subscribe
R6900 Firmware Subscribe
R7200 Firmware Subscribe
R7350 Firmware Subscribe
R7400 Firmware Subscribe
R7450 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2024-08-04T16:25:43.625Z

Reserved: 2020-10-27T00:00:00

Link: CVE-2020-27866

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-12T00:15:12.877

Modified: 2024-11-21T05:21:57.740

Link: CVE-2020-27866

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses