8.3
CVSSv2

CVE-2021-34991

Published: 15/11/2021 Updated: 17/11/2021
CVSS v2 Base Score: 8.3 | Impact Score: 10 | Exploitability Score: 6.5
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 739
Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

This vulnerability allows network-adjacent malicious users to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. When parsing the uuid request header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14110.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

netgear ex3700_firmware

netgear ex3800_firmware

netgear ex6120_firmware

netgear ex6130_firmware

netgear r6400_firmware

netgear r6400v2_firmware

netgear r6700v3_firmware

netgear r6900p_firmware

netgear r7000_firmware

netgear r7000p_firmware

netgear r7100lg_firmware

netgear r7850_firmware

netgear r7900p_firmware

netgear r7960p_firmware

netgear r8000_firmware

netgear r8000p_firmware

netgear r8300_firmware

netgear r8500_firmware

netgear rax15_firmware

netgear rax20_firmware

netgear rax200_firmware

netgear rax35v2_firmware

netgear rax38v2_firmware

netgear rax40v2_firmware

netgear rax42_firmware

netgear rax43_firmware

netgear rax45_firmware

netgear rax48_firmware

netgear rax50_firmware

netgear rax50s_firmware

netgear rax75_firmware

netgear rax80_firmware

netgear raxe450_firmware

netgear raxe500_firmware

netgear rs400_firmware

netgear wndr3400v3_firmware

netgear wnr3500lv2_firmware

netgear xr300_firmware

netgear d6220_firmware

netgear d6400_firmware

netgear d7000v2_firmware

netgear dgn2200v4_firmware

netgear dc112a_firmware

netgear cax80_firmware