NETGEAR R7000 1.0.11.116 devices have a heap-based Buffer Overflow that is exploitable from the local network without authentication. The vulnerability exists within the handling of an HTTP request. An attacker can leverage this to execute code as root. The problem is that a user-provided length value is trusted during a backup.cgi file upload. The attacker must add a \n before the Content-Length header.
References
Link | Resource |
---|---|
https://ssd-disclosure.com/ssd-advisory-netgear-nighthawk-r7000-httpd-preauth-rce/ | Exploit Third Party Advisory |
https://www.netgear.com/about/security/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-04-26T12:02:32
Updated: 2021-04-26T12:02:32
Reserved: 2021-04-25T00:00:00
Link: CVE-2021-31802
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-04-26T13:15:07.787
Modified: 2021-05-06T20:38:27.247
Link: CVE-2021-31802
JSON object: View
Redhat Information
No data.
CWE