#VU50953 Stack-based buffer overflow in NETGEAR products - CVE-2021-27239

 

#VU50953 Stack-based buffer overflow in NETGEAR products - CVE-2021-27239

Published: February 25, 2021


Vulnerability identifier: #VU50953
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2021-27239
CWE-ID: CWE-121
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
D6220
XR300
WNR3500Lv2
WNDR3400v3
RS400
R8500
R8300
R8000
R7900
R7850
R7100LG
R7000P
R7000
R6900P
R6400v2
R6400
R6300v2
R6250
D8500
D6400
RBS850
RBS750
RBS40V
RBR850
RBR750
RAX80
RAX75
RAX200
R8000P
R7960P
R7900P
R6700v3
EX7500
EX7000
DC112A
D7000v2
Software vendor:
NETGEAR

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the upnpd service. A remote unauthenticated attacker on the local network can use a specially crafted MX header field in an SSDP message, trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links