Authentication Bypass in NETGEAR R6700 Routers
CVE-2020-10924

8.8HIGH

Key Information:

Vendor
Netgear
Status
Vendor
CVE Published:
28 July 2020

Summary

A vulnerability exists in NETGEAR R6700 routers that allows network-adjacent attackers to bypass the required authentication. This flaw is specifically related to the UPnP service, which is configured to listen on TCP port 5000 by default. Attackers can exploit this issue by inputting data that exceeds the acceptable length, enabling them to manipulate memory operations. As a result, this can lead to the execution of code with root privileges, potentially compromising the entire system. For further details, refer to the advisory by Zero Day Initiative.

Affected Version(s)

R6700 V1.0.4.84_10.0.58

References

EPSS Score

51% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Pedro Ribeiro and Radek Domanski of Team Flashback
.