CVE-2021-27239Stack-based Buffer Overflow in Netgear D6220 Firmware

Severity
8.8HIGHNVD
EPSS
2.6%
top 14.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 29
Latest updateAug 7

Description

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 1.0.4.98 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the upnpd service, which listens on UDP port 1900 by default. A crafted MX header field in an SSDP message can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the con

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages36 packages

NVDnetgear/r6400_firmware< 1.0.1.68+1
NVDnetgear/r6700_firmware< 1.0.4.102
NVDnetgear/d6220_firmware< 1.0.0.68
NVDnetgear/d6400_firmware< 1.0.0.102
NVDnetgear/d7000_firmware< 1.0.0.66

🔴Vulnerability Details

4
OSV
cifs-utils vulnerabilities2025-08-07
OSV
cifs-utils vulnerabilities2022-06-02
GHSA
GHSA-hqww-3wrx-q5gv: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 12022-05-24
CVEList
CVE-2021-27239: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400 and R6700 firmware version 12021-03-29
CVE-2021-27239 — Stack-based Buffer Overflow in Netgear | cvebase