8.8

CVE-2020-27861

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.

Data is provided by the National Vulnerability Database (NVD)
NetgearCbk40 Firmware Version < 2.6.1.38
   NetgearCbk40 Version-
NetgearCbk43 Firmware Version < 2.6.1.38
   NetgearCbk43 Version-
NetgearCbr40 Firmware Version < 2.6.1.38
   NetgearCbr40 Version-
NetgearEx6200 Firmware Version < 1.0.1.82
   NetgearEx6200 Versionv2
NetgearEx7700 Firmware Version < 1.0.0.210
   NetgearEx7700 Version-
NetgearEx8000 Firmware Version < 1.0.1.224
   NetgearEx8000 Version-
NetgearRbk12 Firmware Version < 2.6.1.44
   NetgearRbk12 Version-
NetgearRbk13 Firmware Version < 2.6.1.44
   NetgearRbk13 Version-
NetgearRbk14 Firmware Version < 2.6.1.44
   NetgearRbk14 Version-
NetgearRbk15 Firmware Version < 2.6.1.44
   NetgearRbk15 Version-
NetgearRbr10 Firmware Version < 2.6.1.44
   NetgearRbr10 Version-
NetgearRbs10 Firmware Version < 2.6.1.44
   NetgearRbs10 Version-
NetgearRbk20w Firmware Version < 2.6.1.36
   NetgearRbk20w Version-
NetgearRbk23w Firmware Version < 2.6.1.36
   NetgearRbk23w Version-
NetgearRbk20 Router Firmware Version < 2.6.1.36
   NetgearRbk20 Version-
NetgearRbk20 Satellite Firmware Version < 2.6.1.38
   NetgearRbk20 Version-
NetgearRbk22 Router Firmware Version < 2.6.1.36
   NetgearRbk22 Version-
NetgearRbk22 Satellite Firmware Version < 2.6.1.38
   NetgearRbk22 Version-
NetgearRbk23 Router Firmware Version < 2.6.1.36
   NetgearRbk23 Version-
NetgearRbk23 Satellite Firmware Version < 2.6.1.38
   NetgearRbk23 Version-
NetgearRbr20 Firmware Version < 2.6.1.36
   NetgearRbr20 Version-
NetgearRbs20 Firmware Version < 2.6.1.38
   NetgearRbs20 Version-
NetgearRbk30 Firmware Version < 2.6.1.36
   NetgearRbk30 Version-
NetgearRbk33 Firmware Version < 2.6.1.36
   NetgearRbk33 Version-
NetgearRbk40 Router Firmware Version < 2.6.1.36
   NetgearRbk40 Version-
NetgearRbk40 Satellite Firmware Version < 2.6.1.38
   NetgearRbk40 Version-
NetgearRbk43 Router Firmware Version < 2.6.1.36
   NetgearRbk43 Version-
NetgearRbk43 Satellite Firmware Version < 2.6.1.38
   NetgearRbk43 Version-
NetgearRbk43s Router Firmware Version < 2.6.1.36
   NetgearRbk43s Version-
NetgearRbk43s Satellite Firmware Version < 2.6.1.38
   NetgearRbk43s Version-
NetgearRbk44 Router Firmware Version < 2.6.1.36
   NetgearRbk44 Version-
NetgearRbk44 Satellite Firmware Version < 2.6.1.38
   NetgearRbk44 Version-
NetgearRbr40 Firmware Version < 2.6.1.36
   NetgearRbr40 Version-
NetgearRbs40 Firmware Version < 2.6.1.38
   NetgearRbs40 Version-
NetgearRbk50 Firmware Version < 2.6.1.40
   NetgearRbk50 Version-
NetgearRbk50v Firmware Version < 2.6.1.40
   NetgearRbk50v Version-
NetgearRbk52w Firmware Version < 2.6.1.40
   NetgearRbk52w Version-
NetgearRbr50 Firmware Version < 2.6.1.40
   NetgearRbr50 Version-
NetgearRbs50 Firmware Version < 2.6.1.40
   NetgearRbs50 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.12% 0.322
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 8.3 6.5 10
AV:A/AC:L/Au:N/C:C/I:C/A:C
zdi-disclosures@trendmicro.com 8.8 2.8 5.9
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.