First published: Thu Sep 16 2021(Updated: )
Certain NETGEAR smart switches are affected by a \n injection in the web UI's password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the "2" string). This leads to admin session crafting and therefore gaining full web UI admin privileges by an unauthenticated attacker. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Netgear GC108P | <1.0.8.2 | |
Netgear GC108P | ||
All of | ||
Netgear Gc108pp Firmware | <1.0.8.2 | |
Netgear GC108P | ||
All of | ||
Netgear GS108T Firmware | <7.0.7.2 | |
Netgear GS108Ev3 Firmware | ||
All of | ||
Netgear GS110TPP Firmware | <7.0.7.2 | |
Netgear GS110TPP Firmware | ||
All of | ||
Netgear GS110TPP Firmware | <7.0.7.2 | |
Netgear GS110TP Firmware | =v3 | |
All of | ||
Netgear GS110TUP | <1.0.5.3 | |
Netgear GS110TUP Firmware | ||
All of | ||
Netgear GS308T Firmware | <1.0.3.2 | |
Netgear GS308T Firmware | ||
All of | ||
Netgear GS310TP Firmware | <1.0.3.2 | |
Netgear GS310TP Firmware | ||
All of | ||
Netgear GS710TUP | <1.0.5.3 | |
Netgear GS710TUP Firmware | ||
All of | ||
Netgear GS716TP Firmware | <1.0.4.2 | |
Netgear GS716TP Firmware | ||
All of | ||
Netgear GS716TPP Firmware | <1.0.4.2 | |
Netgear GS716TPP Firmware | ||
All of | ||
Netgear GS724TPP Firmware | <2.0.6.3 | |
Netgear GS724TPP Firmware | ||
All of | ||
Netgear GS724TP | <2.0.6.3 | |
Netgear GS724TPv2 | =v2 | |
All of | ||
Netgear GS728TPP Firmware | <2.0.6.3 | |
Netgear GS728TPP Firmware | =v2 | |
All of | ||
Netgear GS728TPP Firmware | <2.0.6.3 | |
Netgear GS728TP Firmware | =v2 | |
All of | ||
Netgear GS750E | <1.0.1.10 | |
Netgear GS750E Firmware | ||
All of | ||
Netgear GS752TPP Firmware | <6.0.8.2 | |
Netgear GS752TPP Firmware | ||
All of | ||
Netgear GS752TP | <6.0.8.2 | |
Netgear GS752TPv2 | =v2 | |
All of | ||
Netgear MS510TXM Firmware | <1.0.4.2 | |
Netgear MS510TXM Firmware | ||
All of | ||
Netgear MS510TxUP | <1.0.4.2 | |
Netgear MS510TXUP Firmware | ||
Netgear GC108P | <1.0.8.2 | |
Netgear GC108P | ||
Netgear Gc108pp Firmware | <1.0.8.2 | |
Netgear GC108P | ||
Netgear GS108T Firmware | <7.0.7.2 | |
Netgear GS108Ev3 Firmware | ||
Netgear GS110TPP Firmware | <7.0.7.2 | |
Netgear GS110TPP Firmware | ||
Netgear GS110TPP Firmware | <7.0.7.2 | |
Netgear GS110TP Firmware | =v3 | |
Netgear GS110TUP | <1.0.5.3 | |
Netgear GS110TUP Firmware | ||
Netgear GS308T Firmware | <1.0.3.2 | |
Netgear GS308T Firmware | ||
Netgear GS310TP Firmware | <1.0.3.2 | |
Netgear GS310TP Firmware | ||
Netgear GS710TUP | <1.0.5.3 | |
Netgear GS710TUP Firmware | ||
Netgear GS716TP Firmware | <1.0.4.2 | |
Netgear GS716TP Firmware | ||
Netgear GS716TPP Firmware | <1.0.4.2 | |
Netgear GS716TPP Firmware | ||
Netgear GS724TPP Firmware | <2.0.6.3 | |
Netgear GS724TPP Firmware | ||
Netgear GS724TP | <2.0.6.3 | |
Netgear GS724TPv2 | =v2 | |
Netgear GS728TPP Firmware | <2.0.6.3 | |
Netgear GS728TPP Firmware | =v2 | |
Netgear GS728TPP Firmware | <2.0.6.3 | |
Netgear GS728TP Firmware | =v2 | |
Netgear GS750E | <1.0.1.10 | |
Netgear GS750E Firmware | ||
Netgear GS752TPP Firmware | <6.0.8.2 | |
Netgear GS752TPP Firmware | ||
Netgear GS752TP | <6.0.8.2 | |
Netgear GS752TPv2 | =v2 | |
Netgear MS510TXM Firmware | <1.0.4.2 | |
Netgear MS510TXM Firmware | ||
Netgear MS510TxUP | <1.0.4.2 | |
Netgear MS510TXUP Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Certain NETGEAR smart switches such as Netgear Gc108p, Netgear Gc108pp, Netgear Gs108t, Netgear Gs110tpp, Netgear Gs110tp, Netgear Gs110tup, Netgear Gs308t, Netgear Gs310tp, Netgear Gs710tup, Netgear Gs716tp, Netgear Gs716tpp, Netgear Gs724tpp, Netgear Gs724tp, Netgear Gs728tpp, Netgear Gs728tp, Netgear Gs750e, Netgear Gs752tpp, Netgear Gs752tp, Netgear Ms510txm, and Netgear Ms510txup are affected by CVE-2021-41314.
CVE-2021-41314 has a severity value of 8.8 (high).
CVE-2021-41314 allows for injection in the web UI's password field on affected NETGEAR smart switches, leading to file creation or overwrite.
NETGEAR has released firmware updates to address the vulnerability, so it is recommended to update the firmware to the latest version provided by NETGEAR.
You can find more information about CVE-2021-41314 in the following references: [Reference 1](https://gynvael.coldwind.pl/?id=742), [Reference 2](https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145).