Netgear R7450 1.2.0.62_1.0.1 mini_httpd improper authorization

entryeditHistoryDiffjsonxmlCTI

A vulnerability, which was classified as critical, has been found in Netgear R7450 1.2.0.62_1.0.1 (Wireless LAN Software). Affected by this issue is an unknown code block of the component mini_httpd. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Field02/05/2021 08:17 AM02/23/2021 03:22 PM
cveCVE-2020-27872CVE-2020-27872
vendorNetgearNetgear
nameR7450R7450
version1.2.0.62_1.0.11.2.0.62_1.0.1
componentmini_httpdmini_httpd
cwe285 (privilege escalation)285 (privilege escalation)
risk22
cvss3_vuldb_avAA
cvss3_vuldb_acLL
cvss3_vuldb_prNN
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
urlhttps://www.zerodayinitiative.com/advisories/ZDI-21-071/https://www.zerodayinitiative.com/advisories/ZDI-21-071/
confirm_urlhttps://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routershttps://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers
date1612479600 (02/05/2021)1612479600 (02/05/2021)
typeWireless LAN SoftwareWireless LAN Software
cvss2_vuldb_avAA
cvss2_vuldb_acLL
cvss2_vuldb_auNN
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_vuldb_eNDND
cvss2_vuldb_rlNDND
cvss2_vuldb_rcNDND
cvss3_vuldb_eXX
cvss3_vuldb_rlXX
cvss3_vuldb_rcXX
cvss2_vuldb_basescore5.85.8
cvss2_vuldb_tempscore5.85.8
cvss3_vuldb_basescore6.36.3
cvss3_vuldb_tempscore6.36.3
cvss3_meta_basescore6.36.3
cvss3_meta_tempscore6.36.3
price_0day$5k-$25k$5k-$25k
cve_assigned1603753200
cve_nvd_summaryThis vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from improper state tracking in the password recovery process. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-11365.

Do you need the next level of professionalism?

Upgrade your account now!