This vulnerability allows network-adjacent malicious users to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
netgear cbk40_firmware |
||
netgear cbk43_firmware |
||
netgear cbr40_firmware |
||
netgear ex6200_firmware |
||
netgear ex7700_firmware |
||
netgear ex8000_firmware |
||
netgear rbk12_firmware |
||
netgear rbk13_firmware |
||
netgear rbk14_firmware |
||
netgear rbk15_firmware |
||
netgear rbr10_firmware |
||
netgear rbs10_firmware |
||
netgear rbk20w_firmware |
||
netgear rbk23w_firmware |
||
netgear rbk20_router_firmware |
||
netgear rbk20_satellite_firmware |
||
netgear rbk22_router_firmware |
||
netgear rbk22_satellite_firmware |
||
netgear rbk23_router_firmware |
||
netgear rbk23_satellite_firmware |
||
netgear rbr20_firmware |
||
netgear rbs20_firmware |
||
netgear rbk30_firmware |
||
netgear rbk33_firmware |
||
netgear rbk40_router_firmware |
||
netgear rbk40_satellite_firmware |
||
netgear rbk43_router_firmware |
||
netgear rbk43_satellite_firmware |
||
netgear rbk43s_router_firmware |
||
netgear rbk43s_satellite_firmware |
||
netgear rbk44_router_firmware |
||
netgear rbk44_satellite_firmware |
||
netgear rbr40_firmware |
||
netgear rbs40_firmware |
||
netgear rbk50_firmware |
||
netgear rbk50v_firmware |
||
netgear rbk52w_firmware |
||
netgear rbr50_firmware |
||
netgear rbs50_firmware |