CVE-2019-17137

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR AC1200 R6220 Firmware version 1.1.0.86 Smart WiFi Router. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of path strings. By inserting a null byte into the path, the user can skip most authentication checks. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-8616.
References
Link Resource
https://www.zerodayinitiative.com/advisories/ZDI-19-866/ Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-19-866/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:ac1200_r6220_firmware:1.1.0.86:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ac1200_r6220:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:31

Type Values Removed Values Added
References () https://www.zerodayinitiative.com/advisories/ZDI-19-866/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-19-866/ - Third Party Advisory, VDB Entry

Information

Published : 2020-02-10 21:51

Updated : 2024-11-21 04:31


NVD link : CVE-2019-17137

Mitre link : CVE-2019-17137

CVE.ORG link : CVE-2019-17137


JSON object : View

Products Affected

netgear

  • ac1200_r6220_firmware
  • ac1200_r6220
CWE
CWE-626

Null Byte Interaction Error (Poison Null Byte)

NVD-CWE-Other