| Vulnerability Name: | CVE-2021-31802 (CCN-200676) | ||||||||||||
| Assigned: | 2021-04-26 | ||||||||||||
| Published: | 2021-04-26 | ||||||||||||
| Updated: | 2021-05-06 | ||||||||||||
| Summary: | NETGEAR R7000 1.0.11.116 devices have a heap-based Buffer Overflow that is exploitable from the local network without authentication. The vulnerability exists within the handling of an HTTP request. An attacker can leverage this to execute code as root. The problem is that a user-provided length value is trusted during a backup.cgi file upload. The attacker must add a \n before the Content-Length header. | ||||||||||||
| CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:R)
7.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:R)
| ||||||||||||
| CVSS v2 Severity: | 8.3 High (CVSS v2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
| Vulnerability Type: | CWE-787 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-31802 Source: XF Type: UNKNOWN netgear-cve202131802-bo(200676) Source: CCN Type: SSD Advisory NETGEAR Nighthawk R7000 httpd PreAuth RCE Source: MISC Type: Exploit, Third Party Advisory https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-httpd-preauth-rce/ Source: CCN Type: NETGEAR Web site NETGEAR: Networking Products Made For You Source: MISC Type: Vendor Advisory https://www.netgear.com/about/security/ | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||