7.9
CVSSv2

CVE-2021-0326

Published: 10/02/2021 Updated: 07/11/2023
CVSS v2 Base Score: 7.9 | Impact Score: 10 | Exploitability Score: 5.5
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 703
Vector: AV:A/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google android 8.1

google android 9.0

google android 10.0

google android 11.0

fedoraproject fedora 32

fedoraproject fedora 34

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Several vulnerabilities have been discovered in wpa_supplicant and hostapd CVE-2020-12695 It was discovered that hostapd does not properly handle UPnP subscribe messages under certain conditions, allowing an attacker to cause a denial of service CVE-2021-0326 It was discovered that wpa_supplicant does not properly process P2P ...
In p2p_copy_client_info of p2pc, there is a possible out of bounds write due to a missing bounds check This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed User interaction is not needed for exploitationProduct: AndroidVersions: Android-10 Android-11 An ...
A security issue was found in hostapd and wpa_supplicant version 29 A missing length check in the p2p_copy_client_info function could lead to a buffer overflow ...

Github Repositories

Skeleton (but pronounced like Peloton): A Zero-Click RCE exploit for CVE-2021-0326

Skeleton (but pronounced like Peloton) A Zero-Click RCE exploit for CVE-2021-0326 on the Peloton Bike And also every other unpatched Android Device PoC requires ASLR to be disabled Associated blog post: wwwnowsecurecom/blog/2022/02/09/a-zero-click-rce-exploit-for-the-peloton-bike-and-also-every-other-unpatched-android-device/