CVE-2021-40847

Severity
8.1HIGH
EPSS
6.1%
top 9.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 21
Latest updateMay 24

Description

The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. While the parental controls themselves are not enabled by default on the routers, the Circle update daemon, circled, is enabled by default. This daemon connects to Circle and NETGEAR to obtain version information and updates to the circled daemon and its filtering database. However, database updates from NETGEAR are unsigned and

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages11 packages

🔴Vulnerability Details

2
GHSA
GHSA-62q2-fg4c-c2qp: The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root2022-05-24
CVEList
CVE-2021-40847: The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root2021-09-21
CVE-2021-40847 (HIGH CVSS 8.1) | The update process of the Circle Pa | cvebase.io