Advisory Details

October 28th, 2021

NETGEAR R7000 SOAP ParentalControl Authentication Bypass Vulnerability

ZDI-21-1239
ZDI-CAN-13483

CVE ID CVE-2021-34977
CVSS SCORE 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS NETGEAR
AFFECTED PRODUCTS R7000
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7000 routers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the processing of SOAP requests. The issue results from the lack of proper authentication verification before performing a password reset. An attacker can leverage this vulnerability to reset the admin password.

ADDITIONAL DETAILS NETGEAR has issued an update to correct this vulnerability. More details can be found at:
https://kb.netgear.com/000064046/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-and-DSL-Modem-Routers-PSV-2021-0134
DISCLOSURE TIMELINE
  • 2021-06-02 - Vulnerability reported to vendor
  • 2021-10-28 - Coordinated public release of advisory
CREDIT Xinan Zhou (the University of California, Riverside and Fudan University)
BACK TO ADVISORIES