Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4hvv-r2vp-wmj4

Опубликовано: 14 янв. 2022
Источник: github
Github: Не прошло ревью

Описание

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setupwizard.cgi page. A crafted SOAP request can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13511.

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setupwizard.cgi page. A crafted SOAP request can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13511.

EPSS

Процентиль: 40%
0.00187
Низкий

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
около 4 лет назад

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setupwizard.cgi page. A crafted SOAP request can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13511.

CVSS3: 8.8
fstec
больше 4 лет назад

Уязвимость компонента setupwizard.cgi микропрограммного обеспечения Wi-Fi роутеров NETGEAR AC2100, AC2400, AC2600, D7000, R6020, R6080, R6120, R6220, R6230, R6350, R6330, R6700v2, R6800, R6850, R6900v2, R7200, R7350, R7400, R7450, WAC124, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 40%
0.00187
Низкий

Дефекты

CWE-787