Metrics
No CVSS v4.0
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
Access Vector Adjacent Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.02592.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Netgear
Subscribe
|
D6220
Subscribe
D6220 Firmware
Subscribe
D6400
Subscribe
D6400 Firmware
Subscribe
D7000
Subscribe
D7000 Firmware
Subscribe
D8500
Subscribe
D8500 Firmware
Subscribe
Dc112a
Subscribe
Dc112a Firmware
Subscribe
Ex7000
Subscribe
Ex7000 Firmware
Subscribe
Ex7500
Subscribe
Ex7500 Firmware
Subscribe
R6250
Subscribe
R6250 Firmware
Subscribe
R6300
Subscribe
R6300 Firmware
Subscribe
R6400
Subscribe
R6400 Firmware
Subscribe
R6700
Subscribe
R6700 Firmware
Subscribe
R6900p
Subscribe
R6900p Firmware
Subscribe
R7000
Subscribe
R7000 Firmware
Subscribe
R7000p
Subscribe
R7000p Firmware
Subscribe
R7100lg
Subscribe
R7100lg Firmware
Subscribe
R7850
Subscribe
R7850 Firmware
Subscribe
R7900
Subscribe
R7900 Firmware
Subscribe
R7900p
Subscribe
R7900p Firmware
Subscribe
R7960p
Subscribe
R7960p Firmware
Subscribe
R8000
Subscribe
R8000 Firmware
Subscribe
R8000p
Subscribe
R8000p Firmware
Subscribe
R8300
Subscribe
R8300 Firmware
Subscribe
R8500
Subscribe
R8500 Firmware
Subscribe
Rax200
Subscribe
Rax200 Firmware
Subscribe
Rax75
Subscribe
Rax75 Firmware
Subscribe
Rax80
Subscribe
Rax80 Firmware
Subscribe
Rbr750
Subscribe
Rbr750 Firmware
Subscribe
Rbr850
Subscribe
Rbr850 Firmware
Subscribe
Rbs40v
Subscribe
Rbs40v Firmware
Subscribe
Rbs750
Subscribe
Rbs750 Firmware
Subscribe
Rbs850
Subscribe
Rbs850 Firmware
Subscribe
Rs400
Subscribe
Rs400 Firmware
Subscribe
Wndr3400
Subscribe
Wndr3400 Firmware
Subscribe
Wnr3500l
Subscribe
Wnr3500l Firmware
Subscribe
Xr300
Subscribe
Xr300 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
Configuration 34 [-]
| AND |
|
Configuration 35 [-]
| AND |
|
Configuration 36 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-14004 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the upnpd service, which listens on UDP port 1900 by default. A crafted MX header field in an SSDP message can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11851. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-03T20:48:16.140Z
Reserved: 2021-02-16T00:00:00
Link: CVE-2021-27239
No data.
Status : Modified
Published: 2021-03-29T21:15:12.377
Modified: 2024-11-21T05:57:39.813
Link: CVE-2021-27239
No data.
OpenCVE Enrichment
No data.
EUVD