Unknown
CVE-2021-27239
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)CVE-2021-27239
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the upnpd service, which listens on UDP port 1900 by default. A crafted MX header field in an SSDP message can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11851.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- d6220 firmware,
- d6400 firmware,
- d7000 firmware,
- d8500 firmware,
- dc112a firmware,
- ex7000 firmware,
- ex7500 firmware,
- r6250 firmware,
- r6300 firmware,
- r6400 firmware,
- r6700 firmware,
- r6900p firmware,
- r7000 firmware,
- r7000p firmware,
- r7100lg firmware,
- r7850 firmware,
- r7900 firmware,
- r7900p firmware,
- r7960p firmware,
- r8000 firmware,
- r8000p firmware,
- r8300 firmware,
- r8500 firmware,
- rax200 firmware,
- rax75 firmware,
- rax80 firmware,
- rbr750 firmware,
- rbr850 firmware,
- rbs40v firmware,
- rbs750 firmware,
- rbs850 firmware,
- rs400 firmware,
- wndr3400 firmware,
- wnr3500l firmware,
- xr300 firmware
Weaknesses
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: