8.8
HIGH
CVE-2020-27861
NETGEAR Orbi Remote Code Execution (RCE) Vulnerability
Description

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.

INFO

Published Date :

Feb. 12, 2021, 12:15 a.m.

Last Modified :

Nov. 21, 2024, 5:21 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

2.8
Public PoC/Exploit Available at Github

CVE-2020-27861 has a 3 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2020-27861 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Netgear ex6200_firmware
2 Netgear ex8000_firmware
3 Netgear cbk40_firmware
4 Netgear cbr40_firmware
5 Netgear rbk12_firmware
6 Netgear rbr10_firmware
7 Netgear rbs10_firmware
8 Netgear rbr20_firmware
9 Netgear rbs20_firmware
10 Netgear rbr40_firmware
11 Netgear rbs40_firmware
12 Netgear rbk50_firmware
13 Netgear rbr50_firmware
14 Netgear rbs50_firmware
15 Netgear ex7700_firmware
16 Netgear rbk13_firmware
17 Netgear rbk14_firmware
18 Netgear rbk15_firmware
19 Netgear rbk50v_firmware
20 Netgear cbk43_firmware
21 Netgear rbk20w_firmware
22 Netgear rbk23w_firmware
23 Netgear rbk20_router_firmware
24 Netgear rbk20_satellite_firmware
25 Netgear rbk22_router_firmware
26 Netgear rbk22_satellite_firmware
27 Netgear rbk23_router_firmware
28 Netgear rbk23_satellite_firmware
29 Netgear rbk30_firmware
30 Netgear rbk33_firmware
31 Netgear rbk40_router_firmware
32 Netgear rbk40_satellite_firmware
33 Netgear rbk43_router_firmware
34 Netgear rbk43_satellite_firmware
35 Netgear rbk43s_router_firmware
36 Netgear rbk43s_satellite_firmware
37 Netgear rbk44_router_firmware
38 Netgear rbk44_satellite_firmware
39 Netgear rbk52w_firmware
40 Netgear rbr20
41 Netgear rbs20
42 Netgear rbk20
43 Netgear rbr40
44 Netgear rbs40
45 Netgear rbk40
46 Netgear rbr50
47 Netgear rbs50
48 Netgear rbk50
49 Netgear ex6200
50 Netgear ex8000
51 Netgear cbr40
52 Netgear ex7700
53 Netgear cbk40
54 Netgear rbk12
55 Netgear rbr10
56 Netgear rbs10
57 Netgear rbk22
58 Netgear cbk43
59 Netgear rbk13
60 Netgear rbk14
61 Netgear rbk15
62 Netgear rbk20w
63 Netgear rbk23w
64 Netgear rbk23
65 Netgear rbk30
66 Netgear rbk33
67 Netgear rbk43
68 Netgear rbk43s
69 Netgear rbk44
70 Netgear rbk50v
71 Netgear rbk52w
References to Advisories, Solutions, and Tools

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Collect some iot-related security articles, including vulnerability analysis, security conferences and papers, etc.

iot-security

Updated: 3 weeks ago
235 stars 27 fork 27 watcher
Born at : Dec. 6, 2022, 1:11 p.m. This repo has been linked 46 different CVEs too.

awesome iot exploit resource

iot security awesome awesome-list firmware hardware-hacking iot-device iot-security embedded exploit vulnerability

Updated: 2 weeks, 5 days ago
43 stars 4 fork 4 watcher
Born at : Nov. 13, 2022, 11:03 p.m. This repo has been linked 25 different CVEs too.

This is a repository for collecting and collating vulnerability disclosures, tips, and tools

Updated: 1 month, 2 weeks ago
12 stars 2 fork 2 watcher
Born at : May 30, 2022, 12:18 p.m. This repo has been linked 10 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2020-27861 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2020-27861 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems
    Added Reference https://www.zerodayinitiative.com/advisories/ZDI-20-1430/
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Modified Analysis by [email protected]

    Mar. 23, 2021

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Mar. 12, 2021

    Action Type Old Value New Value
    Changed Description This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.
  • CVE Modified by [email protected]

    Mar. 12, 2021

    Action Type Old Value New Value
    Changed Description This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.
  • Initial Analysis by [email protected]

    Feb. 16, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:A/AC:L/Au:N/C:C/I:C/A:C)
    Added CVSS V3.1 NIST AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems No Types Assigned https://kb.netgear.com/000062507/Security-Advisory-for-Unauthenticated-Command-Injection-Vulnerability-on-Some-Extenders-and-Orbi-WiFi-Systems Vendor Advisory
    Changed Reference Type https://www.zerodayinitiative.com/advisories/ZDI-20-1430/ No Types Assigned https://www.zerodayinitiative.com/advisories/ZDI-20-1430/ Third Party Advisory, VDB Entry
    Added CWE NIST CWE-78
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:cbk40_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.38 OR cpe:2.3:h:netgear:cbk40:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:cbk43_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.38 OR cpe:2.3:h:netgear:cbk43:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.38 OR cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:ex6200_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.1.82 OR cpe:2.3:h:netgear:ex6200:v2:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:ex7700_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.210 OR cpe:2.3:h:netgear:ex7700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:ex8000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.1.224 OR cpe:2.3:h:netgear:ex8000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk12_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.44 OR cpe:2.3:h:netgear:rbk12:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk13_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.44 OR cpe:2.3:h:netgear:rbk13:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk14_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.44 OR cpe:2.3:h:netgear:rbk14:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk15_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.44 OR cpe:2.3:h:netgear:rbk15:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbr10_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.44 OR cpe:2.3:h:netgear:rbr10:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbs10_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.44 OR cpe:2.3:h:netgear:rbs10:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk20w_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 OR cpe:2.3:h:netgear:rbk20w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk23w_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 OR cpe:2.3:h:netgear:rbk23w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk20_router_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 *cpe:2.3:o:netgear:rbk20_satellite_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.38 OR cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk22_router_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 *cpe:2.3:o:netgear:rbk22_satellite_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.38 OR cpe:2.3:h:netgear:rbk22:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk23_router_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 *cpe:2.3:o:netgear:rbk23_satellite_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.38 OR cpe:2.3:h:netgear:rbk23:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 OR cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.38 OR cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk30_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 OR cpe:2.3:h:netgear:rbk30:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk33_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 OR cpe:2.3:h:netgear:rbk33:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk40_router_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 *cpe:2.3:o:netgear:rbk40_satellite_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.38 OR cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk43_router_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 *cpe:2.3:o:netgear:rbk43_satellite_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.38 OR cpe:2.3:h:netgear:rbk43:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk43s_router_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 *cpe:2.3:o:netgear:rbk43s_satellite_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.38 OR cpe:2.3:h:netgear:rbk43s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk44_router_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 *cpe:2.3:o:netgear:rbk44_satellite_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.38 OR cpe:2.3:h:netgear:rbk44:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.36 OR cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.38 OR cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.40 OR cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk50v_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.40 OR cpe:2.3:h:netgear:rbk50v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbk52w_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.40 OR cpe:2.3:h:netgear:rbk52w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.40 OR cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.1.40 OR cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2020-27861 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.13 }} -0.01%

score

0.48276

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability