CVE-2021-20852
 
Time Line
Published
2024-03-19
Updated
2024-03-19
Firt exploit
2024-03-19
Overview
Descriptions (2)
NVD, NVD
CWE (1)
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC (-)
Risk
CVSS Score
6.8 Medium
SSVC
-
KEV
-
EPSS
0.0%
Affected Products (-)
Vendors (1)
elecom
Products (4)
wrh-733gbk, wrh-733gbk_firmware, wrh-733gwh, wrh-733gwh_firmware
Versions (1)
<= 1.02.9
Intel Resources (-)
Advisories (-)
-
Exploits (-)
-
Plugins (-)
-
References (2)
General (1)
jvn
Exploits & POcs (-)
Patches (-)
Advisories (1)
co
Summary
Descriptions
Buffer overflow vulnerability in ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9 and prior) allows a network-adjacent attacker with an administrator privilege to execute an arbitrary OS command via unspecified vectors.
Una vulnerabilidad de desbordamiento del bĂșfer en los routers LAN de ELECOM (firmware WRH-733GBK versiones v1.02.9 y anteriores y firmware WRH-733GWH versiones v1.02.9 y anteriores) permite a un atacante adyacente a la red con privilegios de administrador ejecutar un comando arbitrario del sistema operativo por medio de vectores no especificados
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2020-12-17 CVE Reserved
- 2021-12-01 CVE Published
- 2023-06-23 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
Threat Intelligence Resources (0)
Select | Title | Date |
---|
Security Advisory details:
Select an advisory to view details here.
Select | Title | Date |
---|
Select an exploit to view details here.
References (2)
URL | Tag | Source |
---|---|---|
https://jvn.jp/en/jp/JVN88993473/index.html | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.elecom.co.jp/news/security/20211130-01 | 2021-12-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Elecom Search vendor "Elecom" | Wrh-733gbk Firmware Search vendor "Elecom" for product "Wrh-733gbk Firmware" | <= 1.02.9 Search vendor "Elecom" for product "Wrh-733gbk Firmware" and version " <= 1.02.9" | - |
Affected
| in | Elecom Search vendor "Elecom" | Wrh-733gbk Search vendor "Elecom" for product "Wrh-733gbk" | - | - |
Safe
|
Elecom Search vendor "Elecom" | Wrh-733gwh Firmware Search vendor "Elecom" for product "Wrh-733gwh Firmware" | <= 1.02.9 Search vendor "Elecom" for product "Wrh-733gwh Firmware" and version " <= 1.02.9" | - |
Affected
| in | Elecom Search vendor "Elecom" | Wrh-733gwh Search vendor "Elecom" for product "Wrh-733gwh" | - | - |
Safe
|