Vulnerability Name:

CCN-213327

Published:2021-11-09
Updated:2021-11-09
Summary:NETGEAR routers are vulnerable to a stack-based buffer overflow, caused by improper bounds checking. By sending a specially crafted request, a remote attacker could overflow a buffer and execute arbitrary code on the system.
CVSS v3 Severity:8.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:8.3 High (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Consequences:Gain Access
References:Source: XF
Type: UNKNOWN
netgear-psv20210168-bo(213327)

Source: CCN
Type: NETGEAR Security Advisory: PSV-2021-0168
Security Advisory for Pre-Authentication Buffer Overflow on Multiple Products

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/h:netgear:r6700:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r6900:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r7100lg:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:d6220:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:d6400:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r7000p:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r8500:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:ex6130:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:dgn2200:v4:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r8000:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r7100lg:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r7850:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r7900:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r7960p:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax20:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax200:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax45:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax75:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax80:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:ex3800:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:ex3700:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:ex6120:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:ex6400:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:r8000p:-:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:d7000:v2:*:*:*:*:*:*:*
  • OR cpe:/h:netgear:rax35:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    netgear r6700 -
    netgear r6900 -
    netgear r7100lg -
    netgear d6220 -
    netgear d6400 -
    netgear r7000p -
    netgear r8500 -
    netgear ex6130 -
    netgear dgn2200 v4
    netgear r8000 -
    netgear r7100lg -
    netgear r7850 -
    netgear r7900 -
    netgear r7960p -
    netgear rax20 -
    netgear rax200 -
    netgear rax45 -
    netgear rax75 -
    netgear rax80 -
    netgear ex3800 -
    netgear ex3700 -
    netgear ex6120 -
    netgear ex6400 -
    netgear r8000p -
    netgear d7000 v2
    netgear rax35 -