// For flags

CVE-2020-17409

NETGEAR Multiple Routers mini_httpd Authentication Bypass Vulnerability

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6120, R6080, R6260, R6220, R6020, JNR3210, and WNR2020 routers with firmware 1.0.66. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-10754.

Esta vulnerabilidad permite a atacantes adyacentes a la red divulgar información confidencial sobre las instalaciones afectadas de los enrutadores NETGEAR R6120, R6080, R6260, R6220, R6020, JNR3210 y WNR2020 con versiones de firmware 1.0.66. No es requerida una autenticación para explotar esta vulnerabilidad. El fallo específico se presenta dentro del servicio mini_httpd, que escucha en el puerto TCP 80 por defecto. El problema resulta de una lógica de coincidencia de cadenas incorrecta cuando se accede a páginas protegidas. Un atacante puede aprovechar esta vulnerabilidad para revelar las credenciales almacenadas, conllevando a un mayor compromiso. Fue ZDI-CAN-10754

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R6120, R6080, R6260, R6220, R6020, JNR3210, and WNR2020 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.

*Credits: Anonymous
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-08-07 CVE Reserved
  • 2020-09-15 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-10-06 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-288: Authentication Bypass Using an Alternate Path or Channel
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netgear
Search vendor "Netgear"
R6020 Firmware
Search vendor "Netgear" for product "R6020 Firmware"
< 1.0.0.44
Search vendor "Netgear" for product "R6020 Firmware" and version " < 1.0.0.44"
-
Affected
in Netgear
Search vendor "Netgear"
R6020
Search vendor "Netgear" for product "R6020"
--
Safe
Netgear
Search vendor "Netgear"
R6080 Firmware
Search vendor "Netgear" for product "R6080 Firmware"
< 1.0.0.44
Search vendor "Netgear" for product "R6080 Firmware" and version " < 1.0.0.44"
-
Affected
in Netgear
Search vendor "Netgear"
R6080
Search vendor "Netgear" for product "R6080"
--
Safe
Netgear
Search vendor "Netgear"
R6120 Firmware
Search vendor "Netgear" for product "R6120 Firmware"
< 1.0.0.70
Search vendor "Netgear" for product "R6120 Firmware" and version " < 1.0.0.70"
-
Affected
in Netgear
Search vendor "Netgear"
R6120
Search vendor "Netgear" for product "R6120"
--
Safe
Netgear
Search vendor "Netgear"
R6220 Firmware
Search vendor "Netgear" for product "R6220 Firmware"
< 1.1.0.100
Search vendor "Netgear" for product "R6220 Firmware" and version " < 1.1.0.100"
-
Affected
in Netgear
Search vendor "Netgear"
R6220
Search vendor "Netgear" for product "R6220"
--
Safe
Netgear
Search vendor "Netgear"
R6230 Firmware
Search vendor "Netgear" for product "R6230 Firmware"
< 1.1.0.100
Search vendor "Netgear" for product "R6230 Firmware" and version " < 1.1.0.100"
-
Affected
in Netgear
Search vendor "Netgear"
R6230
Search vendor "Netgear" for product "R6230"
--
Safe
Netgear
Search vendor "Netgear"
R6260 Firmware
Search vendor "Netgear" for product "R6260 Firmware"
< 1.1.0.76
Search vendor "Netgear" for product "R6260 Firmware" and version " < 1.1.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
R6260
Search vendor "Netgear" for product "R6260"
--
Safe
Netgear
Search vendor "Netgear"
R6330 Firmware
Search vendor "Netgear" for product "R6330 Firmware"
< 1.1.0.76
Search vendor "Netgear" for product "R6330 Firmware" and version " < 1.1.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
R6330
Search vendor "Netgear" for product "R6330"
--
Safe
Netgear
Search vendor "Netgear"
R6350 Firmware
Search vendor "Netgear" for product "R6350 Firmware"
< 1.1.0.76
Search vendor "Netgear" for product "R6350 Firmware" and version " < 1.1.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
R6350
Search vendor "Netgear" for product "R6350"
--
Safe
Netgear
Search vendor "Netgear"
R6850 Firmware
Search vendor "Netgear" for product "R6850 Firmware"
< 1.1.0.76
Search vendor "Netgear" for product "R6850 Firmware" and version " < 1.1.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
R6850
Search vendor "Netgear" for product "R6850"
--
Safe
Netgear
Search vendor "Netgear"
Jnr3210 Firmware
Search vendor "Netgear" for product "Jnr3210 Firmware"
--
Affected
in Netgear
Search vendor "Netgear"
Jnr3210
Search vendor "Netgear" for product "Jnr3210"
--
Safe
Netgear
Search vendor "Netgear"
Wnr2020 Firmware
Search vendor "Netgear" for product "Wnr2020 Firmware"
--
Affected
in Netgear
Search vendor "Netgear"
Wnr2020
Search vendor "Netgear" for product "Wnr2020"
--
Safe