ID

VAR-202104-1038


CVE

CVE-2021-27252


TITLE

NETGEAR R7800  In firmware  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-006382

DESCRIPTION

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the vendor_specific DHCP opcode. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12216. NETGEAR R7800 For firmware, OS A command injection vulnerability exists. Zero Day Initiative To this vulnerability ZDI-CAN-12216 Was numbered.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 2.34

sources: NVD: CVE-2021-27252 // JVNDB: JVNDB-2021-006382 // ZDI: ZDI-21-248 // VULMON: CVE-2021-27252

AFFECTED PRODUCTS

vendor:netgearmodel:rbk53scope:ltversion:2.7.2.104

Trust: 1.0

vendor:netgearmodel:r9000scope:ltversion:1.0.5.28

Trust: 1.0

vendor:netgearmodel:ex6250scope:ltversion:1.0.0.134

Trust: 1.0

vendor:netgearmodel:r7800scope:ltversion:1.0.2.80

Trust: 1.0

vendor:netgearmodel:rbr20scope:ltversion:2.6.2.104

Trust: 1.0

vendor:netgearmodel:r8900scope:ltversion:1.0.5.28

Trust: 1.0

vendor:netgearmodel:rbk20scope:ltversion:2.6.2.104

Trust: 1.0

vendor:netgearmodel:rbk40scope:ltversion:2.6.2.104

Trust: 1.0

vendor:netgearmodel:ex6400scope:ltversion:1.0.2.158

Trust: 1.0

vendor:netgearmodel:rbs50scope:ltversion:2.7.2.104

Trust: 1.0

vendor:netgearmodel:rbs10scope:ltversion:2.6.2.104

Trust: 1.0

vendor:netgearmodel:rbk12scope:ltversion:2.7.2.104

Trust: 1.0

vendor:netgearmodel:rbs40scope:ltversion:2.6.2.104

Trust: 1.0

vendor:netgearmodel:d7800scope:ltversion:1.0.1.60

Trust: 1.0

vendor:netgearmodel:ex6420scope:ltversion:1.0.0.134

Trust: 1.0

vendor:netgearmodel:ex7300scope:ltversion:1.0.2.158

Trust: 1.0

vendor:netgearmodel:ex6400v2scope:ltversion:1.0.0.134

Trust: 1.0

vendor:netgearmodel:ex7320scope:ltversion:1.0.0.134

Trust: 1.0

vendor:netgearmodel:rbr50scope:ltversion:2.7.2.104

Trust: 1.0

vendor:netgearmodel:rbk13scope:ltversion:2.7.2.104

Trust: 1.0

vendor:netgearmodel:rbk23scope:ltversion:2.7.2.104

Trust: 1.0

vendor:netgearmodel:br200scope:ltversion:5.10.0.5

Trust: 1.0

vendor:netgearmodel:rbk44scope:ltversion:2.6.2.104

Trust: 1.0

vendor:netgearmodel:xr500scope:ltversion:2.3.2.114

Trust: 1.0

vendor:netgearmodel:lbr20scope:ltversion:2.6.3.50

Trust: 1.0

vendor:netgearmodel:rbs20scope:ltversion:2.6.2.104

Trust: 1.0

vendor:netgearmodel:ex6410scope:ltversion:1.0.0.134

Trust: 1.0

vendor:netgearmodel:rbs50yscope:ltversion:2.6.2.104

Trust: 1.0

vendor:netgearmodel:rbk50scope:ltversion:2.7.2.104

Trust: 1.0

vendor:netgearmodel:xr450scope:ltversion:2.3.2.114

Trust: 1.0

vendor:netgearmodel:br500scope:ltversion:5.10.0.5

Trust: 1.0

vendor:netgearmodel:rbk14scope:ltversion:2.7.2.104

Trust: 1.0

vendor:netgearmodel:ex6150scope:ltversion:1.0.1.98

Trust: 1.0

vendor:netgearmodel:ex7300v2scope:ltversion:1.0.0.134

Trust: 1.0

vendor:netgearmodel:xr700scope:ltversion:1.0.1.38

Trust: 1.0

vendor:netgearmodel:rbr40scope:ltversion:2.6.2.104

Trust: 1.0

vendor:netgearmodel:ex6100v2scope:ltversion:1.0.1.98

Trust: 1.0

vendor:netgearmodel:rbk43scope:ltversion:2.6.2.104

Trust: 1.0

vendor:netgearmodel:ex7700scope:ltversion:1.0.0.216

Trust: 1.0

vendor:netgearmodel:rbr10scope:ltversion:2.6.2.104

Trust: 1.0

vendor:netgearmodel:rbk43sscope:ltversion:2.6.2.104

Trust: 1.0

vendor:netgearmodel:ex8000scope:ltversion:1.0.1.232

Trust: 1.0

vendor:netgearmodel:rbk15scope:ltversion:2.7.2.104

Trust: 1.0

vendor:ネットギアmodel:br500scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7800scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6410scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6150scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d7800scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6100v2scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6250scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:br200scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6400v2scope: - version: -

Trust: 0.8

vendor:netgearmodel:r7800scope: - version: -

Trust: 0.7

sources: ZDI: ZDI-21-248 // JVNDB: JVNDB-2021-006382 // NVD: CVE-2021-27252

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-27252
value: HIGH

Trust: 1.0

zdi-disclosures@trendmicro.com: CVE-2021-27252
value: HIGH

Trust: 1.0

NVD: CVE-2021-27252
value: HIGH

Trust: 0.8

ZDI: CVE-2021-27252
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202104-1073
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2021-27252
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

zdi-disclosures@trendmicro.com: CVE-2021-27252
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2021-27252
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ZDI: CVE-2021-27252
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-21-248 // JVNDB: JVNDB-2021-006382 // CNNVD: CNNVD-202104-1073 // NVD: CVE-2021-27252 // NVD: CVE-2021-27252

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-006382 // NVD: CVE-2021-27252

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202104-1073

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202104-1073

PATCH

title:Security Advisory for Multiple Vulnerabilities on Some Routers, Satellites, and Extendersurl:https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders

Trust: 1.5

title:Netgear NETGEAR R7800 Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=147594

Trust: 0.6

sources: ZDI: ZDI-21-248 // JVNDB: JVNDB-2021-006382 // CNNVD: CNNVD-202104-1073

EXTERNAL IDS

db:NVDid:CVE-2021-27252

Trust: 4.0

db:ZDIid:ZDI-21-248

Trust: 3.2

db:JVNDBid:JVNDB-2021-006382

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-12216

Trust: 0.7

db:CNNVDid:CNNVD-202104-1073

Trust: 0.6

db:VULMONid:CVE-2021-27252

Trust: 0.1

sources: ZDI: ZDI-21-248 // VULMON: CVE-2021-27252 // JVNDB: JVNDB-2021-006382 // CNNVD: CNNVD-202104-1073 // NVD: CVE-2021-27252

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-21-248/

Trust: 2.6

url:https://kb.netgear.com/000062883/security-advisory-for-multiple-vulnerabilities-on-some-routers-satellites-and-extenders

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-27252

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-21-248 // VULMON: CVE-2021-27252 // JVNDB: JVNDB-2021-006382 // CNNVD: CNNVD-202104-1073 // NVD: CVE-2021-27252

CREDITS

atdog (@atdog_tw)

Trust: 0.7

sources: ZDI: ZDI-21-248

SOURCES

db:ZDIid:ZDI-21-248
db:VULMONid:CVE-2021-27252
db:JVNDBid:JVNDB-2021-006382
db:CNNVDid:CNNVD-202104-1073
db:NVDid:CVE-2021-27252

LAST UPDATE DATE

2024-11-23T22:47:39.525000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-248date:2021-02-24T00:00:00
db:VULMONid:CVE-2021-27252date:2021-04-27T00:00:00
db:JVNDBid:JVNDB-2021-006382date:2022-01-06T05:00:00
db:CNNVDid:CNNVD-202104-1073date:2021-04-28T00:00:00
db:NVDid:CVE-2021-27252date:2024-11-21T05:57:41.453

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-248date:2021-02-24T00:00:00
db:VULMONid:CVE-2021-27252date:2021-04-14T00:00:00
db:JVNDBid:JVNDB-2021-006382date:2022-01-06T00:00:00
db:CNNVDid:CNNVD-202104-1073date:2021-04-14T00:00:00
db:NVDid:CVE-2021-27252date:2021-04-14T16:15:13.737