Lucene search

K
zdiMichael Flanders of Trend Micro Zero Day InitiativeZDI-19-866
HistoryOct 10, 2019 - 12:00 a.m.

NETGEAR AC1200 mini_httpd Poison Null Byte Authentication Bypass Vulnerability

2019-10-1000:00:00
Michael Flanders of Trend Micro Zero Day Initiative
www.zerodayinitiative.com
35

0.007 Low

EPSS

Percentile

80.1%

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR AC1200 Smart WiFi Router. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of path strings. By inserting a null byte into the path, the user can skip most authentication checks. An attacker can leverage this vulnerability to bypass authentication on the system.

0.007 Low

EPSS

Percentile

80.1%