Metrics
No CVSS v4.0
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
Access Vector Adjacent Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.00557.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Netgear
Subscribe
|
Br200
Subscribe
Br200 Firmware
Subscribe
Br500
Subscribe
Br500 Firmware
Subscribe
D7800
Subscribe
D7800 Firmware
Subscribe
Ex6100v2
Subscribe
Ex6100v2 Firmware
Subscribe
Ex6150v2
Subscribe
Ex6150v2 Firmware
Subscribe
Ex6250
Subscribe
Ex6250 Firmware
Subscribe
Ex6400
Subscribe
Ex6400 Firmware
Subscribe
Ex6400v2
Subscribe
Ex6400v2 Firmware
Subscribe
Ex6410
Subscribe
Ex6410 Firmware
Subscribe
Ex6420
Subscribe
Ex6420 Firmware
Subscribe
Ex7300
Subscribe
Ex7300 Firmware
Subscribe
Ex7300v2
Subscribe
Ex7300v2 Firmware
Subscribe
Ex7320
Subscribe
Ex7320 Firmware
Subscribe
Ex7700
Subscribe
Ex7700 Firmware
Subscribe
Ex8000
Subscribe
Ex8000 Firmware
Subscribe
Lbr20
Subscribe
Lbr20 Firmware
Subscribe
R7800
Subscribe
R7800 Firmware
Subscribe
R8900
Subscribe
R8900 Firmware
Subscribe
R9000
Subscribe
R9000 Firmware
Subscribe
Rbk12
Subscribe
Rbk12 Firmware
Subscribe
Rbk13
Subscribe
Rbk13 Firmware
Subscribe
Rbk14
Subscribe
Rbk14 Firmware
Subscribe
Rbk15
Subscribe
Rbk15 Firmware
Subscribe
Rbk20
Subscribe
Rbk20 Firmware
Subscribe
Rbk23
Subscribe
Rbk23 Firmware
Subscribe
Rbk40
Subscribe
Rbk40 Firmware
Subscribe
Rbk43
Subscribe
Rbk43 Firmware
Subscribe
Rbk43s
Subscribe
Rbk43s Firmware
Subscribe
Rbk44
Subscribe
Rbk44 Firmware
Subscribe
Rbk50
Subscribe
Rbk50 Firmware
Subscribe
Rbk53
Subscribe
Rbk53 Firmware
Subscribe
Rbr10
Subscribe
Rbr10 Firmware
Subscribe
Rbr20
Subscribe
Rbr20 Firmware
Subscribe
Rbr40
Subscribe
Rbr40 Firmware
Subscribe
Rbr50
Subscribe
Rbr50 Firmware
Subscribe
Rbs10
Subscribe
Rbs10 Firmware
Subscribe
Rbs20
Subscribe
Rbs20 Firmware
Subscribe
Rbs40
Subscribe
Rbs40 Firmware
Subscribe
Rbs50
Subscribe
Rbs50 Firmware
Subscribe
Rbs50y
Subscribe
Rbs50y Firmware
Subscribe
Xr450
Subscribe
Xr450 Firmware
Subscribe
Xr500
Subscribe
Xr500 Firmware
Subscribe
Xr700
Subscribe
Xr700 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
Configuration 34 [-]
| AND |
|
Configuration 35 [-]
| AND |
|
Configuration 36 [-]
| AND |
|
Configuration 37 [-]
| AND |
|
Configuration 38 [-]
| AND |
|
Configuration 39 [-]
| AND |
|
Configuration 40 [-]
| AND |
|
Configuration 41 [-]
| AND |
|
Configuration 42 [-]
| AND |
|
Configuration 43 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-14021 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the rc_service parameter provided to apply_save.cgi. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12355. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-03T20:48:16.076Z
Reserved: 2021-02-16T00:00:00
Link: CVE-2021-27256
No data.
Status : Modified
Published: 2021-03-05T20:15:12.550
Modified: 2024-11-21T05:57:42.160
Link: CVE-2021-27256
No data.
OpenCVE Enrichment
No data.
EUVD