Summary
Detail | |||
---|---|---|---|
Vendor | Netgear | First view | 2021-02-12 |
Product | rbk44 Satellite Firmware | Last view | 2021-02-12 |
Version | Type | Os | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:o:netgear:rbk44_satellite_firmware:*:*:*:*:*:*:*:* | 1 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.8 | 2021-02-12 | CVE-2020-27861 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |