NETGEAR R7000 1.0.11.116 devices have a heap-based Buffer Overflow that is exploitable from the local network without authentication. The vulnerability exists within the handling of an HTTP request. An attacker can leverage this to execute code as root. The problem is that a user-provided length value is trusted during a backup.cgi file upload. The attacker must add a \n before the Content-Length header.
References
Link | Resource |
---|---|
https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-httpd-preauth-rce/ | Exploit Third Party Advisory |
https://www.netgear.com/about/security/ | Vendor Advisory |
https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-httpd-preauth-rce/ | Exploit Third Party Advisory |
https://www.netgear.com/about/security/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-httpd-preauth-rce/ - Exploit, Third Party Advisory | |
References | () https://www.netgear.com/about/security/ - Vendor Advisory |
Information
Published : 2021-04-26 13:15
Updated : 2024-11-21 06:06
NVD link : CVE-2021-31802
Mitre link : CVE-2021-31802
CVE.ORG link : CVE-2021-31802
JSON object : View
Products Affected
netgear
- r7000
- r7000_firmware
CWE
CWE-787
Out-of-bounds Write