ID

VAR-202104-1480


CVE

CVE-2021-31802


TITLE

NETGEAR R7000 Code Execution Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2022-06702

DESCRIPTION

NETGEAR R7000 1.0.11.116 devices have a heap-based Buffer Overflow that is exploitable from the local network without authentication. The vulnerability exists within the handling of an HTTP request. An attacker can leverage this to execute code as root. The problem is that a user-provided length value is trusted during a backup.cgi file upload. The attacker must add a \n before the Content-Length header. Netgear NETGEAR R7000 is a wireless router from Netgear. NETGEAR R7000 has a security vulnerability in 1.0.11.116, which originates from the failure of network systems or products to properly filter special elements in the process of constructing code segments from external input data. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 2.07

sources: NVD: CVE-2021-31802 // CNVD: CNVD-2022-06702 // CNNVD: CNNVD-202104-975 // VULMON: CVE-2021-31802

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-06702

AFFECTED PRODUCTS

vendor:netgearmodel:r7000scope:lteversion:1.0.11.116

Trust: 1.0

vendor:netgearmodel:r7000scope:lteversion:<=1.0.11.116

Trust: 0.6

sources: CNVD: CNVD-2022-06702 // NVD: CVE-2021-31802

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-31802
value: HIGH

Trust: 1.0

CNVD: CNVD-2022-06702
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202104-1887
value: HIGH

Trust: 0.6

VULMON: CVE-2021-31802
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-31802
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

CNVD: CNVD-2022-06702
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2021-31802
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2022-06702 // VULMON: CVE-2021-31802 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1887 // NVD: CVE-2021-31802

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

sources: NVD: CVE-2021-31802

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202104-1887

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

PATCH

title:CVE-2021-31802url:https://github.com/enty8080/CVE-2021-31802

Trust: 0.1

sources: VULMON: CVE-2021-31802

EXTERNAL IDS

db:NVDid:CVE-2021-31802

Trust: 2.3

db:CNVDid:CNVD-2022-06702

Trust: 0.6

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021042817

Trust: 0.6

db:CNNVDid:CNNVD-202104-1887

Trust: 0.6

db:VULMONid:CVE-2021-31802

Trust: 0.1

sources: CNVD: CNVD-2022-06702 // VULMON: CVE-2021-31802 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1887 // NVD: CVE-2021-31802

REFERENCES

url:https://www.netgear.com/about/security/

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-31802

Trust: 1.2

url:https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-httpd-preauth-rce/

Trust: 1.1

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:httpd-preauth-rce/

Trust: 0.6

url:https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021042817

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://github.com/enty8080/cve-2021-31802

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2022-06702 // VULMON: CVE-2021-31802 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202104-1887 // NVD: CVE-2021-31802

SOURCES

db:CNVDid:CNVD-2022-06702
db:VULMONid:CVE-2021-31802
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202104-1887
db:NVDid:CVE-2021-31802

LAST UPDATE DATE

2024-11-23T19:30:53.361000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-06702date:2022-01-25T00:00:00
db:VULMONid:CVE-2021-31802date:2021-05-06T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202104-1887date:2021-05-07T00:00:00
db:NVDid:CVE-2021-31802date:2024-11-21T06:06:15.283

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-06702date:2022-01-25T00:00:00
db:VULMONid:CVE-2021-31802date:2021-04-26T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202104-1887date:2021-04-26T00:00:00
db:NVDid:CVE-2021-31802date:2021-04-26T13:15:07.787