Vulnerability Details CVE-2020-15636
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR R6400, R6700, R7000, R7850, R7900, R8000, RS400, and XR300 routers with firmware 1.0.4.84_10.0.58. Authentication is not required to exploit this vulnerability. The specific flaw exists within the check_ra service. A crafted raePolicyVersion in a RAE_Policy.json file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9852.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.413
EPSS Ranking 97.2%
CVSS Severity
CVSS v3 Score 8.1
CVSS v2 Score 10.0
Products affected by CVE-2020-15636
-
cpe:2.3:h:netgear:r6700:v3
-
cpe:2.3:o:netgear:r6700_firmware:-
-
cpe:2.3:o:netgear:r6700_firmware:1.0.0.26
-
cpe:2.3:o:netgear:r6700_firmware:1.0.1.14
-
cpe:2.3:o:netgear:r6700_firmware:1.0.1.16
-
cpe:2.3:o:netgear:r6700_firmware:1.0.1.20
-
cpe:2.3:o:netgear:r6700_firmware:1.0.1.22
-
cpe:2.3:o:netgear:r6700_firmware:1.0.1.26
-
cpe:2.3:o:netgear:r6700_firmware:1.0.1.30
-
cpe:2.3:o:netgear:r6700_firmware:1.0.1.36
-
cpe:2.3:o:netgear:r6700_firmware:1.0.1.44
-
cpe:2.3:o:netgear:r6700_firmware:1.0.1.46
-
cpe:2.3:o:netgear:r6700_firmware:1.0.1.48
-
cpe:2.3:o:netgear:r6700_firmware:1.0.2.16
-
cpe:2.3:o:netgear:r6700_firmware:1.0.2.26
-
cpe:2.3:o:netgear:r6700_firmware:1.0.2.32
-
cpe:2.3:o:netgear:r6700_firmware:1.0.2.52
-
cpe:2.3:o:netgear:r6700_firmware:1.0.2.6
-
cpe:2.3:o:netgear:r6700_firmware:1.0.2.62
-
cpe:2.3:o:netgear:r6700_firmware:1.0.2.66
-
cpe:2.3:o:netgear:r6700_firmware:1.0.2.8
-
cpe:2.3:o:netgear:r6700_firmware:1.0.4.84
-
cpe:2.3:o:netgear:r6700_firmware:1.0.4.84_10.0.58