ID

VAR-202109-1948


CVE

CVE-2021-34947


TITLE

NETGEAR R7800 net-cgi Out-Of-Bounds Write Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-21-1116

DESCRIPTION

NETGEAR R7800 net-cgi Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of the soap_block_table file. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13055

Trust: 1.62

sources: NVD: CVE-2021-34947 // ZDI: ZDI-21-1116 // VULMON: CVE-2021-34947

AFFECTED PRODUCTS

vendor:netgearmodel:r7800scope: - version: -

Trust: 0.7

sources: ZDI: ZDI-21-1116

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2021-34947
value: HIGH

Trust: 1.0

ZDI: CVE-2021-34947
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202109-1872
value: HIGH

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2021-34947
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

ZDI: CVE-2021-34947
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-21-1116 // CNNVD: CNNVD-202109-1872 // NVD: CVE-2021-34947

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

sources: NVD: CVE-2021-34947

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202109-1872

PATCH

title:NETGEAR has issued an update to correct this vulnerability.url:https://kb.netgear.com/000064044/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2021-0129

Trust: 0.7

title:Netgear NETGEAR R7800 Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=164868

Trust: 0.6

sources: ZDI: ZDI-21-1116 // CNNVD: CNNVD-202109-1872

EXTERNAL IDS

db:NVDid:CVE-2021-34947

Trust: 2.4

db:ZDIid:ZDI-21-1116

Trust: 2.4

db:ZDI_CANid:ZDI-CAN-13055

Trust: 0.7

db:CS-HELPid:SB2021100101

Trust: 0.6

db:CNNVDid:CNNVD-202109-1872

Trust: 0.6

db:VULMONid:CVE-2021-34947

Trust: 0.1

sources: ZDI: ZDI-21-1116 // VULMON: CVE-2021-34947 // CNNVD: CNNVD-202109-1872 // NVD: CVE-2021-34947

REFERENCES

url:https://kb.netgear.com/000064044/security-advisory-for-pre-authentication-buffer-overflow-on-some-routers-psv-2021-0129

Trust: 1.7

url:https://www.zerodayinitiative.com/advisories/zdi-21-1116/

Trust: 1.7

url:https://www.cybersecurity-help.cz/vdb/sb2021100101

Trust: 0.6

sources: ZDI: ZDI-21-1116 // VULMON: CVE-2021-34947 // CNNVD: CNNVD-202109-1872 // NVD: CVE-2021-34947

CREDITS

Hoang Thach Nguyen of STAR Labs

Trust: 1.3

sources: ZDI: ZDI-21-1116 // CNNVD: CNNVD-202109-1872

SOURCES

db:ZDIid:ZDI-21-1116
db:VULMONid:CVE-2021-34947
db:CNNVDid:CNNVD-202109-1872
db:NVDid:CVE-2021-34947

LAST UPDATE DATE

2024-08-14T14:25:10.240000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-1116date:2021-09-28T00:00:00
db:CNNVDid:CNNVD-202109-1872date:2021-10-08T00:00:00
db:NVDid:CVE-2021-34947date:2024-05-08T13:15:00.690

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-1116date:2021-09-28T00:00:00
db:CNNVDid:CNNVD-202109-1872date:2021-09-28T00:00:00
db:NVDid:CVE-2021-34947date:2024-05-07T23:15:07.653