In NETGEAR Nighthawk X10-R900 prior to 1.0.4.26, an attacker may bypass all authentication checks on the devices NETGEAR Genie SOAP API (/soap/server_sa) by supplying a malicious X-Forwarded-For header of the devices LAN IP address (192.168.1.1) in every request. As a result, an attacker may modify almost all of the devices settings and view various configuration settings.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Nighthawk_x10-r9000_firmware | Netgear | * | 1.0.4.26 (excluding) |