// For flags

CVE-2021-20852

 

Time Line
Published
2024-03-19
Updated
2024-03-19
Firt exploit
2024-03-19
Overview
Descriptions (2)
NVD, NVD
CWE (1)
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC (-)
Risk
CVSS Score
6.8 Medium
SSVC
-
KEV
-
EPSS
0.0%
Affected Products (-)
Vendors (1)
elecom
Products (4)
wrh-733gbk, wrh-733gbk_firmware, wrh-733gwh, wrh-733gwh_firmware
Versions (1)
<= 1.02.9
Intel Resources (-)
Advisories (-)
-
Exploits (-)
-
Plugins (-)
-
References (2)
General (1)
jvn
Exploits & POcs (-)
Patches (-)
Advisories (1)
co
Summary
Descriptions

Buffer overflow vulnerability in ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9 and prior) allows a network-adjacent attacker with an administrator privilege to execute an arbitrary OS command via unspecified vectors.

Una vulnerabilidad de desbordamiento del bĂșfer en los routers LAN de ELECOM (firmware WRH-733GBK versiones v1.02.9 y anteriores y firmware WRH-733GWH versiones v1.02.9 y anteriores) permite a un atacante adyacente a la red con privilegios de administrador ejecutar un comando arbitrario del sistema operativo por medio de vectores no especificados

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-17 CVE Reserved
  • 2021-12-01 CVE Published
  • 2023-06-23 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
Threat Intelligence Resources (0)
Security Advisory details:

Select an advisory to view details here.

Select an exploit to view details here.

References (2)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Elecom
Search vendor "Elecom"
Wrh-733gbk Firmware
Search vendor "Elecom" for product "Wrh-733gbk Firmware"
<= 1.02.9
Search vendor "Elecom" for product "Wrh-733gbk Firmware" and version " <= 1.02.9"
-
Affected
in Elecom
Search vendor "Elecom"
Wrh-733gbk
Search vendor "Elecom" for product "Wrh-733gbk"
--
Safe
Elecom
Search vendor "Elecom"
Wrh-733gwh Firmware
Search vendor "Elecom" for product "Wrh-733gwh Firmware"
<= 1.02.9
Search vendor "Elecom" for product "Wrh-733gwh Firmware" and version " <= 1.02.9"
-
Affected
in Elecom
Search vendor "Elecom"
Wrh-733gwh
Search vendor "Elecom" for product "Wrh-733gwh"
--
Safe