CVE-2021-31802

NETGEAR R7000 1.0.11.116 devices have a heap-based Buffer Overflow that is exploitable from the local network without authentication. The vulnerability exists within the handling of an HTTP request. An attacker can leverage this to execute code as root. The problem is that a user-provided length value is trusted during a backup.cgi file upload. The attacker must add a \n before the Content-Length header.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:06

Type Values Removed Values Added
References () https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-httpd-preauth-rce/ - Exploit, Third Party Advisory () https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-httpd-preauth-rce/ - Exploit, Third Party Advisory
References () https://www.netgear.com/about/security/ - Vendor Advisory () https://www.netgear.com/about/security/ - Vendor Advisory

Information

Published : 2021-04-26 13:15

Updated : 2024-11-21 06:06


NVD link : CVE-2021-31802

Mitre link : CVE-2021-31802

CVE.ORG link : CVE-2021-31802


JSON object : View

Products Affected

netgear

  • r7000
  • r7000_firmware
CWE
CWE-787

Out-of-bounds Write