CVE-2020-27873

This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR R7450 1.2.0.62_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SOAP API endpoint, which listens on TCP port 80 by default. The issue results from the lack of proper access control. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-11559.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
zdiCNA
6.5 MEDIUM
ADJACENT_NETWORK
LOW
NONE
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 47%
VendorProductVersion
netgearac2100_firmware
𝑥
< 1.2.0.76
netgearac2400_firmware
𝑥
< 1.2.0.76
netgearac2600_firmware
𝑥
< 1.2.0.76
netgearr6700_firmware
𝑥
< 1.2.0.76
netgearr6800_firmware
𝑥
< 1.2.0.76
netgearr6900_firmware
𝑥
< 1.2.0.76
netgearr7200_firmware
𝑥
< 1.2.0.76
netgearr7350_firmware
𝑥
< 1.2.0.76
netgearr7400_firmware
𝑥
< 1.2.0.76
netgearr7450_firmware
𝑥
< 1.2.0.76
netgearr6220_firmware
𝑥
< 1.1.0.104
netgearr6230_firmware
𝑥
< 1.1.0.104
netgearr6260_firmware
𝑥
< 1.1.0.78
netgearr6330_firmware
𝑥
< 1.1.0.78
netgearr6350_firmware
𝑥
< 1.1.0.78
netgearr6850_firmware
𝑥
< 1.1.0.78
netgearr6120_firmware
𝑥
< 1.0.0.76
netgearr6020_firmware
𝑥
< 1.0.0.48
netgearr6080_firmware
𝑥
< 1.0.0.48
𝑥
= Vulnerable software versions