⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2021-20166

Severity
8.8HIGH
EPSS
64.2%
top 1.56%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedDec 30
Latest updateAug 19

Description

Netgear RAX43 version 1.0.3.96 contains a buffer overrun vulnerability. The URL parsing functionality in the cgi-bin endpoint of the router containers a buffer overrun issue that can redirection control flow of the applicaiton.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5netgear_rax431.0.3.96

🔴Vulnerability Details

3
GHSA
GHSA-756v-gg77-ccw5: Netgear RAX43 version 12021-12-31
CVEList
CVE-2021-20166: Netgear RAX43 version 12021-12-30
VulnCheck
NETGEAR rax43 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')2021

💥Exploits & PoCs

1
Nuclei
Netgear RAX43 1.0.3.96 - Command Injection/Authentication Bypass Buffer Overrun

🕵️Threat Intelligence

1
Unit42
Network Security Trends: Recent Exploits Observed in the Wild Include Remote Code Execution, Cross-Site Scripting and More2022-08-19
CVE-2021-20166 (HIGH CVSS 8.8) | Netgear RAX43 version 1.0.3.96 cont | cvebase.io