Advisory Details

December 15th, 2020

NETGEAR Orbi UA_Parser Host Name Command Injection Remote Code Execution Vulnerability

ZDI-20-1430
ZDI-CAN-11076

CVE ID CVE-2020-27861
CVSS SCORE 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS NETGEAR
AFFECTED PRODUCTS Orbi
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi routers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root.

ADDITIONAL DETAILS NETGEAR has issued an update to correct this vulnerability. More details can be found at:
https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems
DISCLOSURE TIMELINE
  • 2020-07-10 - Vulnerability reported to vendor
  • 2020-12-15 - Coordinated public release of advisory
CREDIT Shaunak Mirani
BACK TO ADVISORIES