This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11653.

Project Subscriptions

Vendors Products
Netgear Subscribe
Ac2100 Firmware Subscribe
Ac2400 Firmware Subscribe
Ac2600 Firmware Subscribe
R6020 Firmware Subscribe
R6080 Firmware Subscribe
R6120 Firmware Subscribe
R6220 Firmware Subscribe
R6230 Firmware Subscribe
R6260 Firmware Subscribe
R6330 Firmware Subscribe
R6350 Firmware Subscribe
R6700 Firmware Subscribe
R6800 Firmware Subscribe
R6850 Firmware Subscribe
R6900 Firmware Subscribe
R7200 Firmware Subscribe
R7350 Firmware Subscribe
R7400 Firmware Subscribe
R7450 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-20360 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11653.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2024-08-04T16:25:43.694Z

Reserved: 2020-10-27T00:00:00

Link: CVE-2020-27867

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-12T00:15:12.970

Modified: 2024-11-21T05:21:57.877

Link: CVE-2020-27867

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses