Path traversal in NETGEAR Routers and Orbi WiFi Systems



Published: 2022-03-24
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2011-5325
CWE-ID CWE-22
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
R7000P
Hardware solutions / Routers for home users

RS400
Hardware solutions / Routers for home users

R7000
Hardware solutions / Routers for home users

R6900P
Hardware solutions / Routers for home users

R6400v2
Hardware solutions / Routers for home users

CBR40
Hardware solutions / Routers & switches, VoIP, GSM, etc

R6700v3
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor NETGEAR

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Path traversal

EUVDB-ID: #VU61584

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2011-5325

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the BusyBox implementation of tar. A remote attacker can trick pass specially crafted tar archive to the application and overwrite files outside the current working directory via a symlink.

Mitigation

Install update from vendor's website.

Vulnerable software versions

R7000P: before 1.0.11.134

CBR40: before 2.5.0.28

RS400: before 1.5.1.86

R7000: before 1.0.11.134

R6900P: before 1.3.3.148

R6700v3: before 1.0.4.126

R6400v2: before 1.0.4.126

External links

http://kb.netgear.com/000064724/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-and-Orbi-WiFi-Systems-PSV-2021-0330


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###