CVE-2021-34865

HIGH

Netgear Ac2100 Firmware < 1.2.0.88 - Authentication Bypass

Title source: rule
STIX 2.1

Description

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of multiple NETGEAR routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-13313.

Scores

CVSS v3 8.8
EPSS 0.0115
EPSS Percentile 78.6%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-697 CWE-287
Status published
Products (17)
netgear/ac2100_firmware < 1.2.0.88
netgear/ac2400_firmware < 1.2.0.88
netgear/ac2600_firmware < 1.2.0.88
netgear/d7000v1_firmware < 1.0.1.80
netgear/r6220_firmware < 1.1.0.110
netgear/r6230_firmware < 1.1.0.110
netgear/r6260_firmware < 1.1.0.84
netgear/r6330_firmware < 1.1.0.84
netgear/r6350_firmware < 1.1.0.84
netgear/r6700v2_firmware < 1.2.0.88
... and 7 more
Published Jan 25, 2022
Tracked Since Feb 18, 2026