This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11653.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Netgear
Subscribe
|
Ac2100
Subscribe
Ac2100 Firmware
Subscribe
Ac2400
Subscribe
Ac2400 Firmware
Subscribe
Ac2600
Subscribe
Ac2600 Firmware
Subscribe
R6020
Subscribe
R6020 Firmware
Subscribe
R6080
Subscribe
R6080 Firmware
Subscribe
R6120
Subscribe
R6120 Firmware
Subscribe
R6220
Subscribe
R6220 Firmware
Subscribe
R6230
Subscribe
R6230 Firmware
Subscribe
R6260
Subscribe
R6260 Firmware
Subscribe
R6330
Subscribe
R6330 Firmware
Subscribe
R6350
Subscribe
R6350 Firmware
Subscribe
R6700
Subscribe
R6700 Firmware
Subscribe
R6800
Subscribe
R6800 Firmware
Subscribe
R6850
Subscribe
R6850 Firmware
Subscribe
R6900
Subscribe
R6900 Firmware
Subscribe
R7200
Subscribe
R7200 Firmware
Subscribe
R7350
Subscribe
R7350 Firmware
Subscribe
R7400
Subscribe
R7400 Firmware
Subscribe
R7450
Subscribe
R7450 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-20360 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11653. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-04T16:25:43.694Z
Reserved: 2020-10-27T00:00:00
Link: CVE-2020-27867
No data.
Status : Modified
Published: 2021-02-12T00:15:12.970
Modified: 2024-11-21T05:21:57.877
Link: CVE-2020-27867
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD