This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the upnpd service, which listens on UDP port 1900 by default. A crafted MX header field in an SSDP message can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11851.

Project Subscriptions

Vendors Products
Netgear Subscribe
D6220 Firmware Subscribe
D6400 Firmware Subscribe
D7000 Firmware Subscribe
D8500 Firmware Subscribe
Dc112a Firmware Subscribe
Ex7000 Firmware Subscribe
Ex7500 Firmware Subscribe
R6250 Firmware Subscribe
R6300 Firmware Subscribe
R6400 Firmware Subscribe
R6700 Firmware Subscribe
R6900p Firmware Subscribe
R7000 Firmware Subscribe
R7000p Firmware Subscribe
R7100lg Subscribe
R7100lg Firmware Subscribe
R7850 Firmware Subscribe
R7900 Firmware Subscribe
R7900p Firmware Subscribe
R7960p Firmware Subscribe
R8000 Firmware Subscribe
R8000p Firmware Subscribe
R8300 Firmware Subscribe
R8500 Firmware Subscribe
Rax200 Firmware Subscribe
Rax75 Firmware Subscribe
Rax80 Firmware Subscribe
Rbr750 Firmware Subscribe
Rbr850 Firmware Subscribe
Rbs40v Firmware Subscribe
Rbs750 Firmware Subscribe
Rbs850 Firmware Subscribe
Rs400 Firmware Subscribe
Wndr3400 Subscribe
Wndr3400 Firmware Subscribe
Wnr3500l Subscribe
Wnr3500l Firmware Subscribe
Xr300 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-14004 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the upnpd service, which listens on UDP port 1900 by default. A crafted MX header field in an SSDP message can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11851.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2024-08-03T20:48:16.140Z

Reserved: 2021-02-16T00:00:00

Link: CVE-2021-27239

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-29T21:15:12.377

Modified: 2024-11-21T05:57:39.813

Link: CVE-2021-27239

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses