Buffer overflow in Realtek products - CVE-2021-35395

 

Buffer overflow in Realtek products - CVE-2021-35395

Published: August 17, 2021 / Updated: August 25, 2021


Vulnerability identifier: #VU55914
CSH Severity: Critical
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red
CVE-ID: CVE-2021-35395
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
Realtek SDK
Realtek Jungle SDK
Realtek Luna SDK
Software vendor:
Realtek

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in multiple parameters. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

This vulnerability affects the following parameters:

  • "submit-url" parameter in formRebootCheck/formWsc/formWlanMultipleAP
  • "ifname" parameter in formWlSiteSurvey
  • "hostname" parameter in formStaticDHCP
  • "peerPin" parameter in formWsc

Note, as of August 19 the vulnerability is being exploited in-the-wild by the Mirai botnet.


Remediation

Install updates from vendor's website.

External links