8.8

CVE-2021-27239

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the upnpd service, which listens on UDP port 1900 by default. A crafted MX header field in an SSDP message can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11851.

Data is provided by the National Vulnerability Database (NVD)
NetgearD6220 Firmware Version < 1.0.0.68
   NetgearD6220 Version-
NetgearD6400 Firmware Version < 1.0.0.102
   NetgearD6400 Version-
NetgearD7000 Firmware Version < 1.0.0.66
   NetgearD7000 Versionv2
NetgearD8500 Firmware Version < 1.0.3.60
   NetgearD8500 Version-
NetgearDc112a Firmware Version < 1.0.0.54
   NetgearDc112a Version-
NetgearEx7000 Firmware Version < 1.0.1.94
   NetgearEx7000 Version-
NetgearEx7500 Firmware Version < 1.0.0.72
   NetgearEx7500 Version-
NetgearR6250 Firmware Version < 1.0.4.48
   NetgearR6250 Version-
NetgearR6300 Firmware Version < 1.0.4.50
   NetgearR6300 Versionv2
NetgearR6400 Firmware Version < 1.0.1.68
   NetgearR6400 Version-
NetgearR6400 Firmware Version < 1.0.4.102
   NetgearR6400 Versionv2
NetgearR6700 Firmware Version < 1.0.4.102
   NetgearR6700 Versionv3
NetgearR6900p Firmware Version < 1.3.2.132
   NetgearR6900p Version-
NetgearR7000 Firmware Version < 1.0.11.116
   NetgearR7000 Version-
NetgearR7000p Firmware Version < 1.3.2.132
   NetgearR7000p Version-
NetgearR7100lg Firmware Version < 1.0.0.64
   NetgearR7100lg Version-
NetgearR7850 Firmware Version < 1.0.5.68
   NetgearR7850 Version-
NetgearR7900 Firmware Version < 1.0.4.38
   NetgearR7900 Version-
NetgearR7900p Firmware Version < 1.4.1.68
   NetgearR7900p Version-
NetgearR7960p Firmware Version < 1.4.1.68
   NetgearR7960p Version-
NetgearR8000 Firmware Version < 1.0.4.68
   NetgearR8000 Version-
NetgearR8000p Firmware Version < 1.4.1.68
   NetgearR8000p Version-
NetgearR8300 Firmware Version < 1.0.2.144
   NetgearR8300 Version-
NetgearR8500 Firmware Version < 1.0.2.144
   NetgearR8500 Version-
NetgearRax200 Firmware Version < 1.0.2.88
   NetgearRax200 Version-
NetgearRax75 Firmware Version < 1.0.3.102
   NetgearRax75 Version-
NetgearRax80 Firmware Version < 1.0.3.102
   NetgearRax80 Version-
NetgearRbr750 Firmware Version < 3.2.17.12
   NetgearRbr750 Version-
NetgearRbr850 Firmware Version < 3.2.17.12
   NetgearRbr850 Version-
NetgearRbs40v Firmware Version < 2.6.2.4
   NetgearRbs40v Version-
NetgearRbs750 Firmware Version < 3.2.17.12
   NetgearRbs750 Version-
NetgearRbs850 Firmware Version < 3.2.17.12
   NetgearRbs850 Version-
NetgearRs400 Firmware Version <= 1.5.0.68
   NetgearRs400 Version-
NetgearWndr3400 Firmware Version < 1.0.1.38
   NetgearWndr3400 Versionv3
NetgearWnr3500l Firmware Version < 1.2.0.66
   NetgearWnr3500l Versionv2
NetgearXr300 Firmware Version < 1.0.3.56
   NetgearXr300 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.59% 0.85
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 8.3 6.5 10
AV:A/AC:L/Au:N/C:C/I:C/A:C
zdi-disclosures@trendmicro.com 8.8 2.8 5.9
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-121 Stack-based Buffer Overflow

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).