ID

VAR-202105-0900


CVE

CVE-2021-33514


TITLE

plural  NETGEAR  In the device  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-007178

DESCRIPTION

Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3. This affects GC108P prior to 1.0.7.3, GC108PP prior to 1.0.7.3, GS108Tv3 prior to 7.0.6.3, GS110TPPv1 prior to 7.0.6.3, GS110TPv3 prior to 7.0.6.3, GS110TUPv1 prior to 1.0.4.3, GS710TUPv1 prior to 1.0.4.3, GS716TP prior to 1.0.2.3, GS716TPP prior to 1.0.2.3, GS724TPPv1 prior to 2.0.4.3, GS724TPv2 prior to 2.0.4.3, GS728TPPv2 prior to 6.0.6.3, GS728TPv2 prior to 6.0.6.3, GS752TPPv1 prior to 6.0.6.3, GS752TPv2 prior to 6.0.6.3, MS510TXM prior to 1.0.2.3, and MS510TXUP prior to 1.0.2.3

Trust: 1.71

sources: NVD: CVE-2021-33514 // JVNDB: JVNDB-2021-007178 // VULMON: CVE-2021-33514

AFFECTED PRODUCTS

vendor:netgearmodel:gs728tpscope:ltversion:6.0.6.3

Trust: 1.0

vendor:netgearmodel:ms510txmscope:ltversion:1.0.2.3

Trust: 1.0

vendor:netgearmodel:gc108pscope:ltversion:1.0.7.3

Trust: 1.0

vendor:netgearmodel:gs724tpscope:ltversion:2.0.4.3

Trust: 1.0

vendor:netgearmodel:gs110tupscope:ltversion:1.0.4.3

Trust: 1.0

vendor:netgearmodel:gs110tpscope:ltversion:7.0.6.3

Trust: 1.0

vendor:netgearmodel:gc108ppscope:ltversion:1.0.7.3

Trust: 1.0

vendor:netgearmodel:gs716tppscope:ltversion:1.0.2.3

Trust: 1.0

vendor:netgearmodel:gs710tupscope:ltversion:1.0.4.3

Trust: 1.0

vendor:netgearmodel:gs108tscope:ltversion:7.0.6.3

Trust: 1.0

vendor:netgearmodel:ms510txupscope:ltversion:1.0.2.3

Trust: 1.0

vendor:netgearmodel:gs110tppscope:ltversion:7.0.6.3

Trust: 1.0

vendor:netgearmodel:gs752tppscope:ltversion:6.0.6.3

Trust: 1.0

vendor:netgearmodel:gs716tpscope:ltversion:1.0.2.3

Trust: 1.0

vendor:netgearmodel:gs724tppscope:ltversion:2.0.4.3

Trust: 1.0

vendor:netgearmodel:gs728tppscope:ltversion:6.0.6.3

Trust: 1.0

vendor:netgearmodel:gs752tpscope:ltversion:6.0.6.3

Trust: 1.0

vendor:ネットギアmodel:gs110tupscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs110tpscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs110tppscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gc108pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs108tscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs710tupscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs724tppscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gc108ppscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs716tpscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:gs716tppscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-007178 // NVD: CVE-2021-33514

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33514
value: CRITICAL

Trust: 1.0

cve@mitre.org: CVE-2021-33514
value: HIGH

Trust: 1.0

NVD: CVE-2021-33514
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202105-1401
value: CRITICAL

Trust: 0.6

VULMON: CVE-2021-33514
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-33514
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-33514
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

cve@mitre.org: CVE-2021-33514
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-33514
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-33514 // JVNDB: JVNDB-2021-007178 // CNNVD: CNNVD-202105-1401 // NVD: CVE-2021-33514 // NVD: CVE-2021-33514

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-007178 // NVD: CVE-2021-33514

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202105-1401

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202105-1401

PATCH

title:Security Advisory for Pre-Authentication Command Injection Vulnerability on Some Smart Switches, PSV-2021-0071url:https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071

Trust: 0.8

title:Netgear NETGEAR Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=152237

Trust: 0.6

title: - url:https://github.com/f1tao/awesome-iot-security-resource

Trust: 0.1

title:SecBooksurl:https://github.com/SexyBeast233/SecBooks

Trust: 0.1

sources: VULMON: CVE-2021-33514 // JVNDB: JVNDB-2021-007178 // CNNVD: CNNVD-202105-1401

EXTERNAL IDS

db:NVDid:CVE-2021-33514

Trust: 3.3

db:JVNDBid:JVNDB-2021-007178

Trust: 0.8

db:CNNVDid:CNNVD-202105-1401

Trust: 0.6

db:VULMONid:CVE-2021-33514

Trust: 0.1

sources: VULMON: CVE-2021-33514 // JVNDB: JVNDB-2021-007178 // CNNVD: CNNVD-202105-1401 // NVD: CVE-2021-33514

REFERENCES

url:https://gynvael.coldwind.pl/?lang=en&id=733

Trust: 2.5

url:https://kb.netgear.com/000063641/security-advisory-for-pre-authentication-command-injection-vulnerability-on-some-smart-switches-psv-2021-0071

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-33514

Trust: 1.4

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/f1tao/awesome-iot-security-resource

Trust: 0.1

url:https://github.com/sexybeast233/secbooks

Trust: 0.1

sources: VULMON: CVE-2021-33514 // JVNDB: JVNDB-2021-007178 // CNNVD: CNNVD-202105-1401 // NVD: CVE-2021-33514

SOURCES

db:VULMONid:CVE-2021-33514
db:JVNDBid:JVNDB-2021-007178
db:CNNVDid:CNNVD-202105-1401
db:NVDid:CVE-2021-33514

LAST UPDATE DATE

2024-08-14T14:55:57.208000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-33514date:2022-01-04T00:00:00
db:JVNDBid:JVNDB-2021-007178date:2022-02-03T08:31:00
db:CNNVDid:CNNVD-202105-1401date:2021-05-28T00:00:00
db:NVDid:CVE-2021-33514date:2022-01-04T16:53:10.093

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-33514date:2021-05-21T00:00:00
db:JVNDBid:JVNDB-2021-007178date:2022-02-03T00:00:00
db:CNNVDid:CNNVD-202105-1401date:2021-05-21T00:00:00
db:NVDid:CVE-2021-33514date:2021-05-21T23:15:07.377