Unknown
CVE-2021-34991
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)CVE-2021-34991
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. When parsing the uuid request header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14110.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- cax80 firmware,
- d6220 firmware,
- d6400 firmware,
- d7000v2 firmware,
- dc112a firmware,
- dgn2200v4 firmware,
- ex3700 firmware,
- ex3800 firmware,
- ex6120 firmware,
- ex6130 firmware,
- r6400 firmware,
- r6400v2 firmware,
- r6700v3 firmware,
- r6900p firmware,
- r7000 firmware,
- r7000p firmware,
- r7100lg firmware,
- r7850 firmware,
- r7900p firmware,
- r7960p firmware,
- r8000 firmware,
- r8000p firmware,
- r8300 firmware,
- r8500 firmware,
- rax15 firmware,
- rax20 firmware,
- rax200 firmware,
- rax35v2 firmware,
- rax38v2 firmware,
- rax40v2 firmware,
- rax42 firmware,
- rax43 firmware,
- rax45 firmware,
- rax48 firmware,
- rax50 firmware,
- rax50s firmware,
- rax75 firmware,
- rax80 firmware,
- raxe450 firmware,
- raxe500 firmware,
- rs400 firmware,
- wndr3400v3 firmware,
- wnr3500lv2 firmware,
- xr300 firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: