This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Nighthawk R7800. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the rc_service parameter provided to apply_bind.cgi. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12303.

Project Subscriptions

Vendors Products
Netgear Subscribe
Br200 Firmware Subscribe
Br500 Firmware Subscribe
D7800 Firmware Subscribe
Ex6100v2 Firmware Subscribe
Ex6150 Firmware Subscribe
Ex6250 Firmware Subscribe
Ex6400 Firmware Subscribe
Ex6400v2 Firmware Subscribe
Ex6410 Firmware Subscribe
Ex6420 Firmware Subscribe
Ex7300 Firmware Subscribe
Ex7300v2 Firmware Subscribe
Ex7320 Firmware Subscribe
Ex7700 Firmware Subscribe
Ex8000 Firmware Subscribe
Lbr20 Firmware Subscribe
R7800 Firmware Subscribe
R8900 Firmware Subscribe
R9000 Firmware Subscribe
Rbk12 Firmware Subscribe
Rbk13 Firmware Subscribe
Rbk14 Firmware Subscribe
Rbk15 Firmware Subscribe
Rbk20 Firmware Subscribe
Rbk23 Firmware Subscribe
Rbk40 Firmware Subscribe
Rbk43 Firmware Subscribe
Rbk43s Firmware Subscribe
Rbk44 Firmware Subscribe
Rbk50 Firmware Subscribe
Rbk53 Firmware Subscribe
Rbr10 Firmware Subscribe
Rbr20 Firmware Subscribe
Rbr40 Firmware Subscribe
Rbr50 Firmware Subscribe
Rbs10 Firmware Subscribe
Rbs20 Firmware Subscribe
Rbs40 Firmware Subscribe
Rbs50 Firmware Subscribe
Rbs50y Firmware Subscribe
Xr450 Firmware Subscribe
Xr500 Firmware Subscribe
Xr700 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-14018 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Nighthawk R7800. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the rc_service parameter provided to apply_bind.cgi. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12303.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2024-08-03T20:48:16.037Z

Reserved: 2021-02-16T00:00:00

Link: CVE-2021-27253

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-14T16:15:13.797

Modified: 2024-11-21T05:57:41.613

Link: CVE-2021-27253

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses