First published: Thu Jan 13 2022(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 1.1.0.78_1.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setupwizard.cgi page. A crafted SOAP request can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13511.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear R6260 Firmware | =1.1.0.78_1.0.1 | |
NETGEAR R6260 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34978 is a vulnerability that allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 routers.
CVE-2021-34978 has a severity score of 8.8, which is considered high.
An attacker can exploit CVE-2021-34978 by sending a crafted SOAP request to the setupwizard.cgi page.
No, authentication is not required to exploit CVE-2021-34978.
You can find more information about CVE-2021-34978 in the reference links provided: [link1](https://kb.netgear.com/000064258/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Routers-DSL-Modem-Routers-and-Access-Points-PSV-2021-0151-and-PSV-2021-0170?article=000064258) and [link2](https://www.zerodayinitiative.com/advisories/ZDI-21-1240/).