Vulnerability Details : CVE-2019-17137
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR AC1200 R6220 Firmware version 1.1.0.86 Smart WiFi Router. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of path strings. By inserting a null byte into the path, the user can skip most authentication checks. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-8616.
Products affected by CVE-2019-17137
- cpe:2.3:o:netgear:ac1200_r6220_firmware:1.1.0.86:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-17137
0.68%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-17137
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.4
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H |
3.9
|
5.5
|
Zero Day Initiative | |
9.4
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H |
3.9
|
5.5
|
NIST |
CWE ids for CVE-2019-17137
-
The product does not properly handle null bytes or NUL characters when passing data between different representations or components.Assigned by: zdi-disclosures@trendmicro.com (Secondary)
References for CVE-2019-17137
-
https://www.zerodayinitiative.com/advisories/ZDI-19-866/
ZDI-19-866 | Zero Day InitiativeThird Party Advisory;VDB Entry
Jump to