This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Orbi 2.5.1.16 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UA_Parser utility. A crafted Host Name option in a DHCP request can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11076.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| netgear | cbk40_firmware | 2.6.1.38 | - |
| netgear | cbk43_firmware | 2.6.1.38 | - |
| netgear | cbr40_firmware | 2.6.1.38 |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
39
Affected Products
4
References
netgear / cbk40_firmware
| - |
| netgear | ex6200_firmware | 1.0.1.82 | - |
| netgear | ex7700_firmware | 1.0.0.210 | - |
| netgear | ex8000_firmware | 1.0.1.224 | - |
| netgear | rbk12_firmware | 2.6.1.44 | - |
| netgear | rbk13_firmware | 2.6.1.44 | - |
| netgear | rbk14_firmware | 2.6.1.44 | - |
| netgear | rbk15_firmware | 2.6.1.44 | - |
| netgear | rbr10_firmware | 2.6.1.44 | - |
| netgear | rbs10_firmware | 2.6.1.44 | - |
| netgear | rbk20w_firmware | 2.6.1.36 | - |
| netgear | rbk23w_firmware | 2.6.1.36 | - |
| netgear | rbk20_router_firmware | 2.6.1.36 | - |
| netgear | rbk20_satellite_firmware | 2.6.1.38 | - |
| netgear | rbk22_router_firmware | 2.6.1.36 | - |
| netgear | rbk22_satellite_firmware | 2.6.1.38 | - |
| netgear | rbk23_router_firmware | 2.6.1.36 | - |
| netgear | rbk23_satellite_firmware | 2.6.1.38 | - |
| netgear | rbr20_firmware | 2.6.1.36 | - |
| netgear | rbs20_firmware | 2.6.1.38 | - |
| netgear | rbk30_firmware | 2.6.1.36 | - |
| netgear | rbk33_firmware | 2.6.1.36 | - |
| netgear | rbk40_router_firmware | 2.6.1.36 | - |
| netgear | rbk40_satellite_firmware | 2.6.1.38 | - |
| netgear | rbk43_router_firmware | 2.6.1.36 | - |
| netgear | rbk43_satellite_firmware | 2.6.1.38 | - |
| netgear | rbk43s_router_firmware | 2.6.1.36 | - |
| netgear | rbk43s_satellite_firmware | 2.6.1.38 | - |
| netgear | rbk44_router_firmware | 2.6.1.36 | - |
| netgear | rbk44_satellite_firmware | 2.6.1.38 | - |
| netgear | rbr40_firmware | 2.6.1.36 | - |
| netgear | rbs40_firmware | 2.6.1.38 | - |
| netgear | rbk50_firmware | 2.6.1.40 | - |
| netgear | rbk50v_firmware | 2.6.1.40 | - |
| netgear | rbk52w_firmware | 2.6.1.40 | - |
| netgear | rbr50_firmware | 2.6.1.40 | - |
| netgear | rbs50_firmware | 2.6.1.40 | - |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact