8.8
CVSSv3

CVE-2021-27239

Published: 29/03/2021 Updated: 02/04/2021
CVSS v2 Base Score: 8.3 | Impact Score: 10 | Exploitability Score: 6.5
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 740
Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

This vulnerability allows network-adjacent malicious users to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the upnpd service, which listens on UDP port 1900 by default. A crafted MX header field in an SSDP message can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11851.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

netgear d6220_firmware

netgear d6400_firmware

netgear d7000_firmware

netgear d8500_firmware

netgear dc112a_firmware

netgear ex7000_firmware

netgear ex7500_firmware

netgear r6250_firmware

netgear r6300_firmware

netgear r6400_firmware

netgear r6700_firmware

netgear r6900p_firmware

netgear r7000_firmware

netgear r7000p_firmware

netgear r7100lg_firmware

netgear r7850_firmware

netgear r7900_firmware

netgear r7900p_firmware

netgear r7960p_firmware

netgear r8000_firmware

netgear r8000p_firmware

netgear r8300_firmware

netgear r8500_firmware

netgear rax200_firmware

netgear rax75_firmware

netgear rax80_firmware

netgear rbr750_firmware

netgear rbr850_firmware

netgear rbs40v_firmware

netgear rbs750_firmware

netgear rbs850_firmware

netgear rs400_firmware

netgear wndr3400_firmware

netgear wnr3500l_firmware

netgear xr300_firmware