NETGEAR R7000 1.0.11.116 devices have a heap-based Buffer Overflow that is exploitable from the local network without authentication. The vulnerability exists within the handling of an HTTP request. An attacker can leverage this to execute code as root. The problem is that a user-provided length value is trusted during a backup.cgi file upload. The attacker must add a \n before the Content-Length header.
References
Link | Resource |
---|---|
https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-httpd-preauth-rce/ | Exploit Third Party Advisory |
https://www.netgear.com/about/security/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-04-26 06:15
Updated : 2021-05-06 13:38
NVD link : CVE-2021-31802
Mitre link : CVE-2021-31802
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
netgear
- r7000
- r7000_firmware