| CVE ID | CVE-2020-27861 |
| CVSS SCORE | 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| AFFECTED VENDORS |
NETGEAR |
| AFFECTED PRODUCTS |
Orbi |
| VULNERABILITY DETAILS |
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. |
| ADDITIONAL DETAILS |
NETGEAR has issued an update to correct this vulnerability. More details can be found at:
https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems |
| DISCLOSURE TIMELINE |
|
| CREDIT | Shaunak Mirani |