This vulnerability allows network-adjacent malicious users to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15692.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
netgear r6400 firmware |
||
netgear r6700 firmware |
||
netgear r6900p firmware |
||
netgear r7000 firmware |
||
netgear r7000p firmware |
||
netgear r7850 firmware |
||
netgear r7900p firmware |
||
netgear r7960p firmware |
||
netgear r8000 firmware |
||
netgear r8000p firmware |
||
netgear r8500 firmware |
||
netgear rax200 firmware |
||
netgear rax75 firmware |
||
netgear rax80 firmware |
||
netgear rs400 firmware |
||
netgear r7100lg firmware |
||
netgear wndr3400 firmware |
||
netgear wnr3500l firmware |
||
netgear xr300 firmware |
||
netgear dc112a firmware |
||
netgear d6220 firmware |
||
netgear d6400 firmware |
||
netgear ex3700 firmware |
||
netgear ex3800 firmware |
||
netgear ex6120 firmware |
||
netgear ex6130 firmware |
||
netgear d7000v2 firmware |