// For flags

CVE-2020-27867

NETGEAR Multiple Routers mini_httpd Command Injection Remote Code Execution Vulnerability

Severity Score

6.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11653.

Esta vulnerabilidad permite a los atacantes adyacentes a la red ejecutar código arbitrario en las instalaciones afectadas de los routers NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100 y Nighthawk AC2400. Aunque la autenticación es necesaria para explotar esta vulnerabilidad, el mecanismo de autenticación existente puede ser evitado. El fallo específico existe en el servicio mini_httpd, que escucha en el puerto TCP 80 por defecto. Al analizar el parámetro funjsq_access_token, el proceso no valida correctamente una cadena suministrada por el usuario antes de utilizarla para ejecutar una llamada al sistema. Un atacante puede aprovechar esta vulnerabilidad para ejecutar código en el contexto de root. Era ZDI-CAN-11653

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. When parsing the funjsq_access_token parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.

*Credits: 1sd3d
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-27 CVE Reserved
  • 2020-12-21 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netgear
Search vendor "Netgear"
Ac2100 Firmware
Search vendor "Netgear" for product "Ac2100 Firmware"
< 1.2.0.76
Search vendor "Netgear" for product "Ac2100 Firmware" and version " < 1.2.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
Ac2100
Search vendor "Netgear" for product "Ac2100"
--
Safe
Netgear
Search vendor "Netgear"
Ac2400 Firmware
Search vendor "Netgear" for product "Ac2400 Firmware"
< 1.2.0.76
Search vendor "Netgear" for product "Ac2400 Firmware" and version " < 1.2.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
Ac2400
Search vendor "Netgear" for product "Ac2400"
--
Safe
Netgear
Search vendor "Netgear"
Ac2600 Firmware
Search vendor "Netgear" for product "Ac2600 Firmware"
< 1.2.0.76
Search vendor "Netgear" for product "Ac2600 Firmware" and version " < 1.2.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
Ac2600
Search vendor "Netgear" for product "Ac2600"
--
Safe
Netgear
Search vendor "Netgear"
R6700 Firmware
Search vendor "Netgear" for product "R6700 Firmware"
< 1.2.0.76
Search vendor "Netgear" for product "R6700 Firmware" and version " < 1.2.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
R6700
Search vendor "Netgear" for product "R6700"
v2
Search vendor "Netgear" for product "R6700" and version "v2"
-
Safe
Netgear
Search vendor "Netgear"
R6800 Firmware
Search vendor "Netgear" for product "R6800 Firmware"
< 1.2.0.76
Search vendor "Netgear" for product "R6800 Firmware" and version " < 1.2.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
R6800
Search vendor "Netgear" for product "R6800"
--
Safe
Netgear
Search vendor "Netgear"
R6900 Firmware
Search vendor "Netgear" for product "R6900 Firmware"
< 1.2.0.76
Search vendor "Netgear" for product "R6900 Firmware" and version " < 1.2.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
R6900
Search vendor "Netgear" for product "R6900"
v2
Search vendor "Netgear" for product "R6900" and version "v2"
-
Safe
Netgear
Search vendor "Netgear"
R7200 Firmware
Search vendor "Netgear" for product "R7200 Firmware"
< 1.2.0.76
Search vendor "Netgear" for product "R7200 Firmware" and version " < 1.2.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
R7200
Search vendor "Netgear" for product "R7200"
--
Safe
Netgear
Search vendor "Netgear"
R7350 Firmware
Search vendor "Netgear" for product "R7350 Firmware"
< 1.2.0.76
Search vendor "Netgear" for product "R7350 Firmware" and version " < 1.2.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
R7350
Search vendor "Netgear" for product "R7350"
--
Safe
Netgear
Search vendor "Netgear"
R7400 Firmware
Search vendor "Netgear" for product "R7400 Firmware"
< 1.2.0.76
Search vendor "Netgear" for product "R7400 Firmware" and version " < 1.2.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
R7400
Search vendor "Netgear" for product "R7400"
--
Safe
Netgear
Search vendor "Netgear"
R7450 Firmware
Search vendor "Netgear" for product "R7450 Firmware"
< 1.2.0.76
Search vendor "Netgear" for product "R7450 Firmware" and version " < 1.2.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
R7450
Search vendor "Netgear" for product "R7450"
--
Safe
Netgear
Search vendor "Netgear"
R6220 Firmware
Search vendor "Netgear" for product "R6220 Firmware"
< 1.1.0.104
Search vendor "Netgear" for product "R6220 Firmware" and version " < 1.1.0.104"
-
Affected
in Netgear
Search vendor "Netgear"
R6220
Search vendor "Netgear" for product "R6220"
--
Safe
Netgear
Search vendor "Netgear"
R6230 Firmware
Search vendor "Netgear" for product "R6230 Firmware"
< 1.1.0.104
Search vendor "Netgear" for product "R6230 Firmware" and version " < 1.1.0.104"
-
Affected
in Netgear
Search vendor "Netgear"
R6230
Search vendor "Netgear" for product "R6230"
--
Safe
Netgear
Search vendor "Netgear"
R6260 Firmware
Search vendor "Netgear" for product "R6260 Firmware"
< 1.1.0.78
Search vendor "Netgear" for product "R6260 Firmware" and version " < 1.1.0.78"
-
Affected
in Netgear
Search vendor "Netgear"
R6260
Search vendor "Netgear" for product "R6260"
--
Safe
Netgear
Search vendor "Netgear"
R6330 Firmware
Search vendor "Netgear" for product "R6330 Firmware"
< 1.1.0.78
Search vendor "Netgear" for product "R6330 Firmware" and version " < 1.1.0.78"
-
Affected
in Netgear
Search vendor "Netgear"
R6330
Search vendor "Netgear" for product "R6330"
--
Safe
Netgear
Search vendor "Netgear"
R6350 Firmware
Search vendor "Netgear" for product "R6350 Firmware"
< 1.1.0.78
Search vendor "Netgear" for product "R6350 Firmware" and version " < 1.1.0.78"
-
Affected
in Netgear
Search vendor "Netgear"
R6350
Search vendor "Netgear" for product "R6350"
--
Safe
Netgear
Search vendor "Netgear"
R6850 Firmware
Search vendor "Netgear" for product "R6850 Firmware"
< 1.1.0.78
Search vendor "Netgear" for product "R6850 Firmware" and version " < 1.1.0.78"
-
Affected
in Netgear
Search vendor "Netgear"
R6850
Search vendor "Netgear" for product "R6850"
--
Safe
Netgear
Search vendor "Netgear"
R6120 Firmware
Search vendor "Netgear" for product "R6120 Firmware"
< 1.0.0.76
Search vendor "Netgear" for product "R6120 Firmware" and version " < 1.0.0.76"
-
Affected
in Netgear
Search vendor "Netgear"
R6120
Search vendor "Netgear" for product "R6120"
--
Safe
Netgear
Search vendor "Netgear"
R6020 Firmware
Search vendor "Netgear" for product "R6020 Firmware"
< 1.0.0.48
Search vendor "Netgear" for product "R6020 Firmware" and version " < 1.0.0.48"
-
Affected
in Netgear
Search vendor "Netgear"
R6020
Search vendor "Netgear" for product "R6020"
--
Safe
Netgear
Search vendor "Netgear"
R6080 Firmware
Search vendor "Netgear" for product "R6080 Firmware"
< 1.0.0.48
Search vendor "Netgear" for product "R6080 Firmware" and version " < 1.0.0.48"
-
Affected
in Netgear
Search vendor "Netgear"
R6080
Search vendor "Netgear" for product "R6080"
--
Safe