CVE-2021-34991 – NETGEAR R6400v2 UPnP uuid Stack-based Buffer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-34991
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. When parsing the uuid request header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://kb.netgear.com/000064361/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Multiple-Products-PSV-2021-0168 https://www.zerodayinitiative.com/advisories/ZDI-21-1303 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2021-27239 – NETGEAR Multiple Routers SSDP Stack-based Buffer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-27239
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the upnpd service, which listens on UDP port 1900 by default. A crafted MX header field in an SSDP message can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://kb.netgear.com/000062820/Security-Advisory-for-Stack-based-Buffer-Overflow-Remote-Code-Execution-Vulnerability-on-Some-Routers-PSV-2020-0432 https://www.zerodayinitiative.com/advisories/ZDI-21-206 • CWE-121: Stack-based Buffer Overflow •
CVE-2020-28373
https://notcve.org/view.php?id=CVE-2020-28373
upnpd on certain NETGEAR devices allows remote (LAN) attackers to execute arbitrary code via a stack-based buffer overflow. This affects R6400v2 V1.0.4.102_10.0.75, R6400 V1.0.1.62_1.0.41, R7000P V1.3.2.126_10.1.66, XR300 V1.0.3.50_10.3.36, R8000 V1.0.4.62, R8300 V1.0.2.136, R8500 V1.0.2.136, R7300DST V1.0.0.74, R7850 V1.0.5.64, R7900 V1.0.4.30, RAX20 V1.0.2.64, RAX80 V1.0.3.102, and R6250 V1.0.4.44. upnpd en determinados dispositivos NETGEAR permite a atacantes remotos (LAN) ejecutar código arbitrario por medio de un desbordamiento del búfer en la región stack de la memoria. Esto afecta a R6400v2 versión V1.0.4.102_10.0.75, R6400 versión V1.0.1.62_1.0.41, R7000P versión V1.3.2.126_10.1.66, XR300 versión V1.0.3.50_10.3.36, R8000 versión V1.0.4.62, R8300 versión V1.0.2. 136, R8500 versión V1.0.2.136, R7300DST versión V1.0.0.74, R7850 versión V1.0.5.64, R7900 versión V1.0.4.30, RAX20 versión V1.0.2.64, RAX80 versión V1.0.3.102 y R6250 versión V1.0.4. 44 • https://github.com/cpeggg/Netgear-upnpd-poc • CWE-787: Out-of-bounds Write •