This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. When parsing the uuid request header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14110.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Netgear
Subscribe
|
Cax80
Subscribe
Cax80 Firmware
Subscribe
D6220
Subscribe
D6220 Firmware
Subscribe
D6400
Subscribe
D6400 Firmware
Subscribe
D7000v2
Subscribe
D7000v2 Firmware
Subscribe
Dc112a
Subscribe
Dc112a Firmware
Subscribe
Dgn2200v4
Subscribe
Dgn2200v4 Firmware
Subscribe
Ex3700
Subscribe
Ex3700 Firmware
Subscribe
Ex3800
Subscribe
Ex3800 Firmware
Subscribe
Ex6120
Subscribe
Ex6120 Firmware
Subscribe
Ex6130
Subscribe
Ex6130 Firmware
Subscribe
R6400
Subscribe
R6400 Firmware
Subscribe
R6400v2
Subscribe
R6400v2 Firmware
Subscribe
R6700v3
Subscribe
R6700v3 Firmware
Subscribe
R6900p
Subscribe
R6900p Firmware
Subscribe
R7000
Subscribe
R7000 Firmware
Subscribe
R7000p
Subscribe
R7000p Firmware
Subscribe
R7100lg
Subscribe
R7100lg Firmware
Subscribe
R7850
Subscribe
R7850 Firmware
Subscribe
R7900p
Subscribe
R7900p Firmware
Subscribe
R7960p
Subscribe
R7960p Firmware
Subscribe
R8000
Subscribe
R8000 Firmware
Subscribe
R8000p
Subscribe
R8000p Firmware
Subscribe
R8300
Subscribe
R8300 Firmware
Subscribe
R8500
Subscribe
R8500 Firmware
Subscribe
Rax15
Subscribe
Rax15 Firmware
Subscribe
Rax20
Subscribe
Rax200
Subscribe
Rax200 Firmware
Subscribe
Rax20 Firmware
Subscribe
Rax35v2
Subscribe
Rax35v2 Firmware
Subscribe
Rax38v2
Subscribe
Rax38v2 Firmware
Subscribe
Rax40v2
Subscribe
Rax40v2 Firmware
Subscribe
Rax42
Subscribe
Rax42 Firmware
Subscribe
Rax43
Subscribe
Rax43 Firmware
Subscribe
Rax45
Subscribe
Rax45 Firmware
Subscribe
Rax48
Subscribe
Rax48 Firmware
Subscribe
Rax50
Subscribe
Rax50 Firmware
Subscribe
Rax50s
Subscribe
Rax50s Firmware
Subscribe
Rax75
Subscribe
Rax75 Firmware
Subscribe
Rax80
Subscribe
Rax80 Firmware
Subscribe
Raxe450
Subscribe
Raxe450 Firmware
Subscribe
Raxe500
Subscribe
Raxe500 Firmware
Subscribe
Rs400
Subscribe
Rs400 Firmware
Subscribe
Wndr3400v3
Subscribe
Wndr3400v3 Firmware
Subscribe
Wnr3500lv2
Subscribe
Wnr3500lv2 Firmware
Subscribe
Xr300
Subscribe
Xr300 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21638 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. When parsing the uuid request header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14110. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-04T00:26:55.733Z
Reserved: 2021-06-17T00:00:00
Link: CVE-2021-34991
No data.
Status : Modified
Published: 2021-11-15T16:15:09.547
Modified: 2024-11-21T06:11:39.183
Link: CVE-2021-34991
No data.
OpenCVE Enrichment
No data.
EUVD