Severity
8.8HIGH
EPSS
0.2%
top 59.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13
Latest updateJan 14

Description

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setupwizard.cgi page. A crafted SOAP request can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13511.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5netgear/r62601.1.0.78_1.0.1
NVDnetgear/r6260_firmware1.1.0.78_1.0.1

🔴Vulnerability Details

2
GHSA
GHSA-4hvv-r2vp-wmj4: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 12022-01-14
CVEList
CVE-2021-34978: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 12022-01-13
CVE-2021-34978 (HIGH CVSS 8.8) | This vulnerability allows network-a | cvebase.io