// For flags

CVE-2019-17137

NETGEAR AC1200 mini_httpd Poison Null Byte Authentication Bypass Vulnerability

Severity Score

9.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR AC1200 R6220 Firmware version 1.1.0.86 Smart WiFi Router. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of path strings. By inserting a null byte into the path, the user can skip most authentication checks. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-8616.

Esta vulnerabilidad permite a atacantes adyacentes a la red omitir la autenticación en las instalaciones afectadas de Smart WiFi Router de NETGEAR AC1200 R6220 versión de Firmware 1.1.0.86. No es requerida una autenticación para explotar esta vulnerabilidad. El fallo específico se presenta dentro del procesamiento de cadenas de ruta. Mediante la inserción de un byte null en la ruta, el usuario puede omitir la mayoría de las comprobaciones de autenticación. Un atacante puede aprovechar esta vulnerabilidad para omitir la autenticación en el sistema. Fue ZDI-CAN-8616.

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR AC1200 Smart WiFi Router. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the processing of path strings. By inserting a null byte into the path, the user can skip most authentication checks. An attacker can leverage this vulnerability to bypass authentication on the system.

*Credits: Michael Flanders of Trend Micro Zero Day Initiative
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-10-04 CVE Reserved
  • 2019-10-10 CVE Published
  • 2021-01-20 First Exploit
  • 2023-03-07 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-626: Null Byte Interaction Error (Poison Null Byte)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netgear
Search vendor "Netgear"
Ac1200 R6220 Firmware
Search vendor "Netgear" for product "Ac1200 R6220 Firmware"
1.1.0.86
Search vendor "Netgear" for product "Ac1200 R6220 Firmware" and version "1.1.0.86"
-
Affected
in Netgear
Search vendor "Netgear"
Ac1200 R6220
Search vendor "Netgear" for product "Ac1200 R6220"
--
Safe