CVE-2021-27239 – NETGEAR Multiple Routers SSDP Stack-based Buffer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-27239
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the upnpd service, which listens on UDP port 1900 by default. A crafted MX header field in an SSDP message can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. • https://kb.netgear.com/000062820/Security-Advisory-for-Stack-based-Buffer-Overflow-Remote-Code-Execution-Vulnerability-on-Some-Routers-PSV-2020-0432 https://www.zerodayinitiative.com/advisories/ZDI-21-206 • CWE-121: Stack-based Buffer Overflow •
CVE-2020-28373
https://notcve.org/view.php?id=CVE-2020-28373
upnpd on certain NETGEAR devices allows remote (LAN) attackers to execute arbitrary code via a stack-based buffer overflow. This affects R6400v2 V1.0.4.102_10.0.75, R6400 V1.0.1.62_1.0.41, R7000P V1.3.2.126_10.1.66, XR300 V1.0.3.50_10.3.36, R8000 V1.0.4.62, R8300 V1.0.2.136, R8500 V1.0.2.136, R7300DST V1.0.0.74, R7850 V1.0.5.64, R7900 V1.0.4.30, RAX20 V1.0.2.64, RAX80 V1.0.3.102, and R6250 V1.0.4.44. upnpd en determinados dispositivos NETGEAR permite a atacantes remotos (LAN) ejecutar código arbitrario por medio de un desbordamiento del búfer en la región stack de la memoria. Esto afecta a R6400v2 versión V1.0.4.102_10.0.75, R6400 versión V1.0.1.62_1.0.41, R7000P versión V1.3.2.126_10.1.66, XR300 versión V1.0.3.50_10.3.36, R8000 versión V1.0.4.62, R8300 versión V1.0.2. 136, R8500 versión V1.0.2.136, R7300DST versión V1.0.0.74, R7850 versión V1.0.5.64, R7900 versión V1.0.4.30, RAX20 versión V1.0.2.64, RAX80 versión V1.0.3.102 y R6250 versión V1.0.4. 44 • https://github.com/cpeggg/Netgear-upnpd-poc • CWE-787: Out-of-bounds Write •
CVE-2019-20719
https://notcve.org/view.php?id=CVE-2019-20719
Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.48, D6400 before 1.0.0.82, D7000v2 before 1.0.0.52, D8500 before 1.0.3.43, R6250 before 1.0.4.34, R6400 before 1.0.1.44, R6400v2 before 1.0.2.62, R7000P before 1.4.1.30, R7100LG before 1.0.0.48, R7300DST before 1.0.0.68, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.28, R8000P before 1.4.1.30, R8300 before 1.0.2.128, and R8500 before 1.0.2.128. Determinados dispositivos NETGEAR están afectados por un desbordamiento del búfer por parte de un usuario autenticado. Esto afecta a D6220 versiones anteriores a 1.0.0.48, D6400 versiones anteriores a 1.0.0.82, D7000v2 versiones anteriores a 1.0.0.52, D8500 versiones anteriores a 1.0.3.43, R6250 versiones anteriores a 1.0.4.34, R6400 versiones anteriores a 1.0.1.44, R6400v2 versiones anteriores a 1.0.2.62, R7000P versiones anteriores a 1.4.1. 30, R7100LG versiones anteriores a 1.0.0.48, R7300DST versiones anteriores a 1.0.0.68, R7900 versiones anteriores a 1.0.3.8, R7900P versiones anteriores a 1.4.1.30, R8000 versiones anteriores a 1.0.4.28, R8000P versiones anteriores a 1.4.1.30, R8300 versiones anteriores a 1.0.2.128, y R8500 versiones anteriores a 1.0.2.128. • https://kb.netgear.com/000061209/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-and-Gateways-PSV-2018-0194 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •