8.8

CVE-2020-27872

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from improper state tracking in the password recovery process. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11365.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
NetgearAc2100 Firmware Version < 1.2.0.76
   NetgearAc2100 Version-
NetgearAc2400 Firmware Version < 1.2.0.76
   NetgearAc2400 Version-
NetgearAc2600 Firmware Version < 1.2.0.76
   NetgearAc2600 Version-
NetgearR6700 Firmware Version < 1.2.0.76
   NetgearR6700 Versionv2
NetgearR6800 Firmware Version < 1.2.0.76
   NetgearR6800 Version-
NetgearR6900 Firmware Version < 1.2.0.76
   NetgearR6900 Versionv2
NetgearR7200 Firmware Version < 1.2.0.76
   NetgearR7200 Version-
NetgearR7350 Firmware Version < 1.2.0.76
   NetgearR7350 Version-
NetgearR7400 Firmware Version < 1.2.0.76
   NetgearR7400 Version-
NetgearR7450 Firmware Version < 1.2.0.76
   NetgearR7450 Version-
NetgearR6220 Firmware Version < 1.1.0.104
   NetgearR6220 Version-
NetgearR6230 Firmware Version < 1.1.0.104
   NetgearR6230 Version-
NetgearR6260 Firmware Version < 1.1.0.78
   NetgearR6260 Version-
NetgearR6330 Firmware Version < 1.1.0.78
   NetgearR6330 Version-
NetgearR6350 Firmware Version < 1.1.0.78
   NetgearR6350 Version-
NetgearR6850 Firmware Version < 1.1.0.78
   NetgearR6850 Version-
NetgearR6120 Firmware Version < 1.0.0.76
   NetgearR6120 Version-
NetgearR6020 Firmware Version < 1.0.0.48
   NetgearR6020 Version-
NetgearR6080 Firmware Version < 1.0.0.48
   NetgearR6080 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.11% 0.772
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 5.8 6.5 6.4
AV:A/AC:L/Au:N/C:P/I:P/A:P
zdi-disclosures@trendmicro.com 8.8 2.8 5.9
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-642 External Control of Critical State Data

The product stores security-critical state information about its users, or the product itself, in a location that is accessible to unauthorized actors.

CWE-668 Exposure of Resource to Wrong Sphere

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.