This vulnerability allows network-adjacent malicious users to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. When parsing the uuid request header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14110.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
netgear ex3700_firmware |
||
netgear ex3800_firmware |
||
netgear ex6120_firmware |
||
netgear ex6130_firmware |
||
netgear r6400_firmware |
||
netgear r6400v2_firmware |
||
netgear r6700v3_firmware |
||
netgear r6900p_firmware |
||
netgear r7000_firmware |
||
netgear r7000p_firmware |
||
netgear r7100lg_firmware |
||
netgear r7850_firmware |
||
netgear r7900p_firmware |
||
netgear r7960p_firmware |
||
netgear r8000_firmware |
||
netgear r8000p_firmware |
||
netgear r8300_firmware |
||
netgear r8500_firmware |
||
netgear rax15_firmware |
||
netgear rax20_firmware |
||
netgear rax200_firmware |
||
netgear rax35v2_firmware |
||
netgear rax38v2_firmware |
||
netgear rax40v2_firmware |
||
netgear rax42_firmware |
||
netgear rax43_firmware |
||
netgear rax45_firmware |
||
netgear rax48_firmware |
||
netgear rax50_firmware |
||
netgear rax50s_firmware |
||
netgear rax75_firmware |
||
netgear rax80_firmware |
||
netgear raxe450_firmware |
||
netgear raxe500_firmware |
||
netgear rs400_firmware |
||
netgear wndr3400v3_firmware |
||
netgear wnr3500lv2_firmware |
||
netgear xr300_firmware |
||
netgear d6220_firmware |
||
netgear d6400_firmware |
||
netgear d7000v2_firmware |
||
netgear dgn2200v4_firmware |
||
netgear dc112a_firmware |
||
netgear cax80_firmware |