First published: Mon Apr 26 2021(Updated: )
NETGEAR R7000 1.0.11.116 devices have a heap-based Buffer Overflow that is exploitable from the local network without authentication. The vulnerability exists within the handling of an HTTP request. An attacker can leverage this to execute code as root. The problem is that a user-provided length value is trusted during a backup.cgi file upload. The attacker must add a \n before the Content-Length header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Nighthawk R7000 Firmware | <=1.0.11.116 | |
NETGEAR Nighthawk R7000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31802 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2021-31802, users should update their NETGEAR R7000 firmware to a version beyond 1.0.11.116.
CVE-2021-31802 is a heap-based buffer overflow vulnerability.
Yes, CVE-2021-31802 can be exploited from the local network without authentication.
CVE-2021-31802 allows attackers to execute code as root on affected NETGEAR R7000 devices.