CVE-2020-28373

CVSS V2 High 8.3 CVSS V3 High 8.8
Description
upnpd on certain NETGEAR devices allows remote (LAN) attackers to execute arbitrary code via a stack-based buffer overflow. This affects R6400v2 V1.0.4.102_10.0.75, R6400 V1.0.1.62_1.0.41, R7000P V1.3.2.126_10.1.66, XR300 V1.0.3.50_10.3.36, R8000 V1.0.4.62, R8300 V1.0.2.136, R8500 V1.0.2.136, R7300DST V1.0.0.74, R7850 V1.0.5.64, R7900 V1.0.4.30, RAX20 V1.0.2.64, RAX80 V1.0.3.102, and R6250 V1.0.4.44.
Overview
  • CVE ID
  • CVE-2020-28373
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-11-09T22:15:13
  • Last Modified Date
  • 2020-11-23T18:41:35
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:netgear:r6400v2_firmware:1.0.4.102_10.0.75:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6400_firmware:1.0.1.62_1.0.41:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7000p_firmware:1.3.2.126_10.1.66:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:xr300_firmware:1.0.3.50_10.3.36:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r8000_firmware:1.0.4.62:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r8300_firmware:1.0.2.136:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r8500_firmware:1.0.2.136:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7300dst_firmware:1.0.0.74:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7850_firmware:1.0.5.64:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:r7850:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r7900_firmware:1.0.4.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rax20_firmware:1.0.2.64:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:rax80_firmware:1.0.3.102:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:netgear:r6250_firmware:1.0.4.44:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:A/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • ADJACENT_NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 8.3
  • Severity
  • HIGH
  • Exploitability Score
  • 6.5
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • ADJACENT_NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://github.com/cpeggg/Netgear-upnpd-poc Broken Link Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 16:19:13 Added to TrackCVE
2022-12-05 16:20:07 2020-11-09T22:15Z 2020-11-09T22:15:13 CVE Published Date updated
2022-12-05 16:20:07 2020-11-23T18:41:35 CVE Modified Date updated
2022-12-05 16:20:07 Analyzed Vulnerability Status updated