Vulnerability identifier: #VU64816
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
RAX120
Hardware solutions /
Routers for home users
R7800
Hardware solutions /
Routers for home users
RAX120v2
Hardware solutions /
Routers for home users
RBK50
Hardware solutions /
Routers & switches, VoIP, GSM, etc
LBR20
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: NETGEAR
Description
The vulnerability allows a remote administrator on the local network to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions, which leads to security restrictions bypass and privilege escalation.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
RAX120: before 1.2.2.24
RBK50: before 2.7.4.24
LBR20: before 2.6.5.32
R7800: before 1.0.2.84
RAX120v2: before 1.2.2.24
External links
https://kb.netgear.com/000065041/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Routers-and-WiFi-Systems-PSV-2021-0103
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.