ID

VAR-202110-1806


CVE

CVE-2021-34982


TITLE

Out-of-bounds write vulnerability in multiple Netgear products

Trust: 0.8

sources: JVNDB: JVNDB-2021-021931

DESCRIPTION

NETGEAR Multiple Routers httpd Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple NETGEAR routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. When parsing the strings file, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13709. DC112A firmware, EX3700 firmware, EX3800 Multiple Netgear products, including firmware, contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 2.25

sources: NVD: CVE-2021-34982 // JVNDB: JVNDB-2021-021931 // ZDI: ZDI-21-1274

AFFECTED PRODUCTS

vendor:netgearmodel:rax35v2scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:r7960pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:ex3800scope:ltversion:1.0.0.94

Trust: 1.0

vendor:netgearmodel:r6400scope:ltversion:1.0.1.76

Trust: 1.0

vendor:netgearmodel:r7100lgscope:ltversion:1.0.0.72

Trust: 1.0

vendor:netgearmodel:v6510-1fxausscope:ltversion:1.0.0.80

Trust: 1.0

vendor:netgearmodel:rax80scope:ltversion:1.0.5.132

Trust: 1.0

vendor:netgearmodel:xr300scope:ltversion:1.0.3.68

Trust: 1.0

vendor:netgearmodel:raxe500scope:ltversion:1.0.8.70

Trust: 1.0

vendor:netgearmodel:ex3700scope:ltversion:1.0.0.94

Trust: 1.0

vendor:netgearmodel:rs400scope:ltversion:1.5.1.80

Trust: 1.0

vendor:netgearmodel:r6700v3scope:ltversion:1.0.4.120

Trust: 1.0

vendor:netgearmodel:wndr3400v3scope:ltversion:1.0.1.42

Trust: 1.0

vendor:netgearmodel:d6400scope:ltversion:1.0.0.108

Trust: 1.0

vendor:netgearmodel:rax38v2scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:r6400v2scope:ltversion:1.0.4.120

Trust: 1.0

vendor:netgearmodel:d6220scope:ltversion:1.0.0.76

Trust: 1.0

vendor:netgearmodel:ms80scope:ltversion:1.1.6.10

Trust: 1.0

vendor:netgearmodel:rax48scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:wnr3500lv2scope:ltversion:1.2.0.70

Trust: 1.0

vendor:netgearmodel:xr1000scope:ltversion:1.0.0.64

Trust: 1.0

vendor:netgearmodel:rax50scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:r8500scope:ltversion:1.0.2.156

Trust: 1.0

vendor:netgearmodel:rax40v2scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:dgn2200v4scope:ltversion:1.0.0.126

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.76

Trust: 1.0

vendor:netgearmodel:r6900pscope:ltversion:1.3.3.148

Trust: 1.0

vendor:netgearmodel:dc112ascope:ltversion:1.0.0.62

Trust: 1.0

vendor:netgearmodel:mr60scope:ltversion:1.1.6.122

Trust: 1.0

vendor:netgearmodel:ex7500scope:ltversion:1.0.1.76

Trust: 1.0

vendor:netgearmodel:rax43scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:ex7000scope:ltversion:1.0.1.106

Trust: 1.0

vendor:netgearmodel:rax15scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:rax50sscope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.11.128

Trust: 1.0

vendor:netgearmodel:ms60scope:ltversion:1.1.6.122

Trust: 1.0

vendor:netgearmodel:ex6120scope:ltversion:1.0.0.66

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:rax45scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:rax75scope:ltversion:1.0.5.132

Trust: 1.0

vendor:netgearmodel:lax20scope:ltversion:1.1.6.30

Trust: 1.0

vendor:netgearmodel:d7000v2scope:ltversion:1.0.0.76

Trust: 1.0

vendor:netgearmodel:rax42scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:r7850scope:ltversion:1.0.5.76

Trust: 1.0

vendor:netgearmodel:raxe450scope:ltversion:1.0.8.70

Trust: 1.0

vendor:netgearmodel:ex6130scope:ltversion:1.0.0.46

Trust: 1.0

vendor:netgearmodel:r7000pscope:ltversion:1.3.3.148

Trust: 1.0

vendor:netgearmodel:rax20scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:r8300scope:ltversion:1.0.2.156

Trust: 1.0

vendor:netgearmodel:mr80scope:ltversion:1.1.6.10

Trust: 1.0

vendor:netgearmodel:rax200scope:ltversion:1.0.5.132

Trust: 1.0

vendor:ネットギアmodel:mr80scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6130scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6900pscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:dc112ascope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6400v2scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:mr60scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex3800scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ms60scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7100lgscope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6700v3scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6120scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex7500scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ms80scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:lax20scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex7000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex3700scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r7000pscope: - version: -

Trust: 0.8

vendor:netgearmodel:multiple routersscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-21-1274 // JVNDB: JVNDB-2021-021931 // NVD: CVE-2021-34982

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2021-34982
value: HIGH

Trust: 1.0

OTHER: JVNDB-2021-021931
value: HIGH

Trust: 0.8

ZDI: CVE-2021-34982
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202110-2193
value: HIGH

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2021-34982
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

OTHER: JVNDB-2021-021931
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2021-34982
baseSeverity: HIGH
baseScore: 8.8
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-21-1274 // JVNDB: JVNDB-2021-021931 // CNNVD: CNNVD-202110-2193 // NVD: CVE-2021-34982

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-021931 // NVD: CVE-2021-34982

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202110-2193

PATCH

title:NETGEAR has issued an update to correct this vulnerability.url:https://kb.netgear.com/000064313/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Extenders-Routers-and-DSL-Modem-Routers-PSV-2021-0159

Trust: 0.7

title:Netgear NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=167952

Trust: 0.6

sources: ZDI: ZDI-21-1274 // CNNVD: CNNVD-202110-2193

EXTERNAL IDS

db:NVDid:CVE-2021-34982

Trust: 3.9

db:ZDIid:ZDI-21-1274

Trust: 3.1

db:JVNDBid:JVNDB-2021-021931

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-13709

Trust: 0.7

db:CNNVDid:CNNVD-202110-2193

Trust: 0.6

sources: ZDI: ZDI-21-1274 // JVNDB: JVNDB-2021-021931 // CNNVD: CNNVD-202110-2193 // NVD: CVE-2021-34982

REFERENCES

url:https://kb.netgear.com/000064313/security-advisory-for-pre-authentication-buffer-overflow-on-some-extenders-routers-and-dsl-modem-routers-psv-2021-0159

Trust: 2.5

url:https://www.zerodayinitiative.com/advisories/zdi-21-1274/

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-34982

Trust: 0.8

sources: ZDI: ZDI-21-1274 // JVNDB: JVNDB-2021-021931 // CNNVD: CNNVD-202110-2193 // NVD: CVE-2021-34982

CREDITS

Sungur Labs

Trust: 1.3

sources: ZDI: ZDI-21-1274 // CNNVD: CNNVD-202110-2193

SOURCES

db:ZDIid:ZDI-21-1274
db:JVNDBid:JVNDB-2021-021931
db:CNNVDid:CNNVD-202110-2193
db:NVDid:CVE-2021-34982

LAST UPDATE DATE

2025-08-16T23:08:29.384000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-1274date:2021-10-29T00:00:00
db:JVNDBid:JVNDB-2021-021931date:2025-08-15T07:39:00
db:CNNVDid:CNNVD-202110-2193date:2021-11-01T00:00:00
db:NVDid:CVE-2021-34982date:2025-08-14T01:41:19.343

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-1274date:2021-10-29T00:00:00
db:JVNDBid:JVNDB-2021-021931date:2025-08-15T00:00:00
db:CNNVDid:CNNVD-202110-2193date:2021-10-29T00:00:00
db:NVDid:CVE-2021-34982date:2024-05-07T23:15:13.400