This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. When parsing the uuid request header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14110.

Project Subscriptions

Vendors Products
Netgear Subscribe
Cax80 Firmware Subscribe
D6220 Firmware Subscribe
D6400 Firmware Subscribe
D7000v2 Subscribe
D7000v2 Firmware Subscribe
Dc112a Firmware Subscribe
Dgn2200v4 Subscribe
Dgn2200v4 Firmware Subscribe
Ex3700 Firmware Subscribe
Ex3800 Firmware Subscribe
Ex6120 Firmware Subscribe
Ex6130 Firmware Subscribe
R6400 Firmware Subscribe
R6400v2 Subscribe
R6400v2 Firmware Subscribe
R6700v3 Subscribe
R6700v3 Firmware Subscribe
R6900p Firmware Subscribe
R7000 Firmware Subscribe
R7000p Firmware Subscribe
R7100lg Subscribe
R7100lg Firmware Subscribe
R7850 Firmware Subscribe
R7900p Firmware Subscribe
R7960p Firmware Subscribe
R8000 Firmware Subscribe
R8000p Firmware Subscribe
R8300 Firmware Subscribe
R8500 Firmware Subscribe
Rax15 Firmware Subscribe
Rax200 Firmware Subscribe
Rax20 Firmware Subscribe
Rax35v2 Subscribe
Rax35v2 Firmware Subscribe
Rax38v2 Subscribe
Rax38v2 Firmware Subscribe
Rax40v2 Subscribe
Rax40v2 Firmware Subscribe
Rax42 Firmware Subscribe
Rax43 Firmware Subscribe
Rax45 Firmware Subscribe
Rax48 Firmware Subscribe
Rax50 Firmware Subscribe
Rax50s Firmware Subscribe
Rax75 Firmware Subscribe
Rax80 Firmware Subscribe
Raxe450 Subscribe
Raxe450 Firmware Subscribe
Raxe500 Subscribe
Raxe500 Firmware Subscribe
Rs400 Firmware Subscribe
Wndr3400v3 Subscribe
Wndr3400v3 Firmware Subscribe
Wnr3500lv2 Subscribe
Wnr3500lv2 Firmware Subscribe
Xr300 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-21638 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. When parsing the uuid request header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14110.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2024-08-04T00:26:55.733Z

Reserved: 2021-06-17T00:00:00

Link: CVE-2021-34991

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-11-15T16:15:09.547

Modified: 2024-11-21T06:11:39.183

Link: CVE-2021-34991

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses