CVE-2020-10923

HIGH

NETGEAR R6700 V1.0.4.84_10.0.58 - Auth Bypass

Title source: llm

Description

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700 V1.0.4.84_10.0.58 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000. A crafted UPnP message can be used to bypass authentication. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-9642.

Exploits (1)

metasploit WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/netgear_r6700_pass_reset.rb

Scores

CVSS v3 8.8
EPSS 0.6024
EPSS Percentile 98.3%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-305
Status published
Products (1)
netgear/r6700_firmware 1.0.4.84_10.0.58
Published Jul 28, 2020
Tracked Since Feb 18, 2026