ID

VAR-202110-1807


CVE

CVE-2021-34983


TITLE

Vulnerability related to lack of authentication for important functions in multiple NETGEAR products

Trust: 0.8

sources: JVNDB: JVNDB-2021-021935

DESCRIPTION

NETGEAR Multiple Routers httpd Missing Authentication for Critical Function Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of multiple NETGEAR routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the lack of authentication prior to allowing access to system configuration information. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-13708

Trust: 2.25

sources: NVD: CVE-2021-34983 // JVNDB: JVNDB-2021-021935 // ZDI: ZDI-21-1275

AFFECTED PRODUCTS

vendor:netgearmodel:rax75scope:ltversion:1.0.5.132

Trust: 1.0

vendor:netgearmodel:rax35v2scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:r7960pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:ex3800scope:ltversion:1.0.0.94

Trust: 1.0

vendor:netgearmodel:r6400scope:ltversion:1.0.1.76

Trust: 1.0

vendor:netgearmodel:r7100lgscope:ltversion:1.0.0.72

Trust: 1.0

vendor:netgearmodel:v6510-1fxausscope:ltversion:1.0.0.80

Trust: 1.0

vendor:netgearmodel:rax80scope:ltversion:1.0.5.132

Trust: 1.0

vendor:netgearmodel:xr300scope:ltversion:1.0.3.68

Trust: 1.0

vendor:netgearmodel:raxe500scope:ltversion:1.0.8.70

Trust: 1.0

vendor:netgearmodel:ex3700scope:ltversion:1.0.0.94

Trust: 1.0

vendor:netgearmodel:rs400scope:ltversion:1.5.1.80

Trust: 1.0

vendor:netgearmodel:r6700v3scope:ltversion:1.0.4.120

Trust: 1.0

vendor:netgearmodel:wndr3400v3scope:ltversion:1.0.1.42

Trust: 1.0

vendor:netgearmodel:d6400scope:ltversion:1.0.0.108

Trust: 1.0

vendor:netgearmodel:rax38v2scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:r8000pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:r6400v2scope:ltversion:1.0.4.120

Trust: 1.0

vendor:netgearmodel:d6220scope:ltversion:1.0.0.76

Trust: 1.0

vendor:netgearmodel:ms80scope:ltversion:1.1.6.10

Trust: 1.0

vendor:netgearmodel:rax48scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:wnr3500lv2scope:ltversion:1.2.0.70

Trust: 1.0

vendor:netgearmodel:xr1000scope:ltversion:1.0.0.64

Trust: 1.0

vendor:netgearmodel:rax50scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:r8500scope:ltversion:1.0.2.156

Trust: 1.0

vendor:netgearmodel:rax40v2scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:r8000scope:ltversion:1.0.4.76

Trust: 1.0

vendor:netgearmodel:r6900pscope:ltversion:1.3.3.148

Trust: 1.0

vendor:netgearmodel:dc112ascope:ltversion:1.0.0.62

Trust: 1.0

vendor:netgearmodel:mr60scope:ltversion:1.1.6.122

Trust: 1.0

vendor:netgearmodel:ex7500scope:ltversion:1.0.1.76

Trust: 1.0

vendor:netgearmodel:rax43scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:ex7000scope:ltversion:1.0.1.106

Trust: 1.0

vendor:netgearmodel:d7000v2scope:ltversion:1.0.0.76

Trust: 1.0

vendor:netgearmodel:dgn2200v4scope:ltversion:1.0.0.126

Trust: 1.0

vendor:netgearmodel:r7000scope:ltversion:1.0.11.128

Trust: 1.0

vendor:netgearmodel:ms60scope:ltversion:1.1.6.122

Trust: 1.0

vendor:netgearmodel:ex6120scope:ltversion:1.0.0.66

Trust: 1.0

vendor:netgearmodel:r7900pscope:ltversion:1.4.2.84

Trust: 1.0

vendor:netgearmodel:rax15scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:rax45scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:lax20scope:ltversion:1.1.6.30

Trust: 1.0

vendor:netgearmodel:rax50sscope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:rax42scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:r7850scope:ltversion:1.0.5.76

Trust: 1.0

vendor:netgearmodel:raxe450scope:ltversion:1.0.8.70

Trust: 1.0

vendor:netgearmodel:ex6130scope:ltversion:1.0.0.46

Trust: 1.0

vendor:netgearmodel:r7000pscope:ltversion:1.3.3.148

Trust: 1.0

vendor:netgearmodel:rax20scope:ltversion:1.0.4.100

Trust: 1.0

vendor:netgearmodel:r8300scope:ltversion:1.0.2.156

Trust: 1.0

vendor:netgearmodel:mr80scope:ltversion:1.1.6.10

Trust: 1.0

vendor:netgearmodel:rax200scope:ltversion:1.0.5.132

Trust: 1.0

vendor:ネットギアmodel:d6220scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex3700scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:xr300scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6120scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ms60scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex7500scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:xr1000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex6130scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:r6400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d6400scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:lax20scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:mr80scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:dc112ascope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex3800scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ex7000scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:d7000v2scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:dgn2200v4scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:ms80scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:mr60scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:v6510-1fxausscope: - version: -

Trust: 0.8

vendor:netgearmodel:multiple routersscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-21-1275 // JVNDB: JVNDB-2021-021935 // NVD: CVE-2021-34983

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2021-34983
value: MEDIUM

Trust: 1.0

OTHER: JVNDB-2021-021935
value: MEDIUM

Trust: 0.8

ZDI: CVE-2021-34983
value: MEDIUM

Trust: 0.7

CNNVD: CNNVD-202110-2191
value: MEDIUM

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2021-34983
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.0

OTHER: JVNDB-2021-021935
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2021-34983
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-21-1275 // JVNDB: JVNDB-2021-021935 // CNNVD: CNNVD-202110-2191 // NVD: CVE-2021-34983

PROBLEMTYPE DATA

problemtype:CWE-306

Trust: 1.0

problemtype:Lack of authentication for critical features (CWE-306) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-021935 // NVD: CVE-2021-34983

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202110-2191

PATCH

title:NETGEAR has issued an update to correct this vulnerability.url:https://kb.netgear.com/000064313/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Extenders-Routers-and-DSL-Modem-Routers-PSV-2021-0159

Trust: 0.7

title:Netgear NETGEAR Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=167951

Trust: 0.6

sources: ZDI: ZDI-21-1275 // CNNVD: CNNVD-202110-2191

EXTERNAL IDS

db:NVDid:CVE-2021-34983

Trust: 3.9

db:ZDIid:ZDI-21-1275

Trust: 3.1

db:JVNDBid:JVNDB-2021-021935

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-13708

Trust: 0.7

db:CNNVDid:CNNVD-202110-2191

Trust: 0.6

sources: ZDI: ZDI-21-1275 // JVNDB: JVNDB-2021-021935 // CNNVD: CNNVD-202110-2191 // NVD: CVE-2021-34983

REFERENCES

url:https://kb.netgear.com/000064313/security-advisory-for-pre-authentication-buffer-overflow-on-some-extenders-routers-and-dsl-modem-routers-psv-2021-0159

Trust: 2.5

url:https://www.zerodayinitiative.com/advisories/zdi-21-1275/

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-34983

Trust: 0.8

sources: ZDI: ZDI-21-1275 // JVNDB: JVNDB-2021-021935 // CNNVD: CNNVD-202110-2191 // NVD: CVE-2021-34983

CREDITS

Sungur Labs

Trust: 1.3

sources: ZDI: ZDI-21-1275 // CNNVD: CNNVD-202110-2191

SOURCES

db:ZDIid:ZDI-21-1275
db:JVNDBid:JVNDB-2021-021935
db:CNNVDid:CNNVD-202110-2191
db:NVDid:CVE-2021-34983

LAST UPDATE DATE

2025-08-20T23:06:15.645000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-1275date:2021-10-29T00:00:00
db:JVNDBid:JVNDB-2021-021935date:2025-08-18T05:10:00
db:CNNVDid:CNNVD-202110-2191date:2021-11-01T00:00:00
db:NVDid:CVE-2021-34983date:2025-08-14T01:40:56.983

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-1275date:2021-10-29T00:00:00
db:JVNDBid:JVNDB-2021-021935date:2025-08-18T00:00:00
db:CNNVDid:CNNVD-202110-2191date:2021-10-29T00:00:00
db:NVDid:CVE-2021-34983date:2024-05-07T23:15:13.573