Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-34947 |
CWE-ID | CWE-787 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
R6700AX Hardware solutions / Routers for home users R7800 Hardware solutions / Routers for home users R8900 Hardware solutions / Routers for home users R9000 Hardware solutions / Routers for home users RAX10 Hardware solutions / Routers for home users RAX120 Hardware solutions / Routers for home users RAX120v2 Hardware solutions / Routers for home users RAX70 Hardware solutions / Routers for home users RAX78 Hardware solutions / Routers for home users XR700 Hardware solutions / Routers for home users |
Vendor | NETGEAR |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU56975
Risk: Medium
CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-34947
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error within the parsing of the soap_block_table file. A remote attacker on the local network can trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsR6700AX: before 1.0.5.108
R7800: before 1.0.2.84
R8900: before 1.0.5.36
R9000: before 1.0.5.36
RAX10: before 1.0.5.108
RAX120: before 1.2.2.24
RAX120v2: before 1.2.2.24
RAX70: before 1.0.5.108
RAX78: before 1.0.5.108
XR700: before 1.0.1.44
CPE2.3https://www.zerodayinitiative.com/advisories/ZDI-21-1116/
https://kb.netgear.com/000064044/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2021-0129
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.