First published: Thu Jan 13 2022(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6260 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setupwizard.cgi page. When parsing the SOAP_LOGIN_TOKEN environment variable, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R6260 | ||
Netgear R6260 Firmware | =1.1.0.78_1.0.1 | |
NETGEAR R6260 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-34980 is high with a CVSS score of 8.8.
CVE-2021-34980 allows network-adjacent attackers to execute arbitrary code by exploiting a stack-based buffer overflow vulnerability in the setupwizard.cgi page of NETGEAR R6260 routers.
No, authentication is not required to exploit CVE-2021-34980.
The affected software for CVE-2021-34980 is NETGEAR R6260 routers with firmware version 1.1.0.78_1.0.1.
To fix CVE-2021-34980, it is recommended to update the firmware of NETGEAR R6260 routers to a version that addresses the vulnerability.