CWE
190
Advisory Published
Updated

CVE-2021-45608: Integer Overflow

First published: Sun Dec 26 2021(Updated: )

Certain D-Link, Edimax, NETGEAR, TP-Link, Tenda, and Western Digital devices are affected by an integer overflow by an unauthenticated attacker. Remote code execution from the WAN interface (TCP port 20005) cannot be ruled out; however, exploitability was judged to be of "rather significant complexity" but not "impossible." The overflow is in SoftwareBus_dispatchNormalEPMsgOut in the KCodes NetUSB kernel module. Affected NETGEAR devices are D7800 before 1.0.1.68, R6400v2 before 1.0.4.122, and R6700v3 before 1.0.4.122.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Netgear D7800 Firmware<1.0.1.68
Netgear D7800
Netgear R6400v2 Firmware<1.0.4.122
NETGEAR R6400v2
Netgear R6700v3 Firmware<1.0.4.122
NETGEAR R6700v3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-45608?

    CVE-2021-45608 refers to an integer overflow vulnerability affecting certain D-Link, Edimax, NETGEAR, TP-Link, Tenda, and Western Digital devices.

  • What is the severity of CVE-2021-45608?

    The severity of CVE-2021-45608 is rated as critical with a CVSS score of 9.8.

  • Which devices are affected by CVE-2021-45608?

    Certain D-Link, Edimax, NETGEAR, TP-Link, Tenda, and Western Digital devices are affected by CVE-2021-45608.

  • How can an attacker exploit CVE-2021-45608?

    An unauthenticated attacker can potentially exploit CVE-2021-45608 to execute remote code from the WAN interface (TCP port 20005).

  • Are Netgear D7800, Netgear R6400v2, and Netgear R6700v3 vulnerable to CVE-2021-45608?

    Netgear D7800 (firmware version up to 1.0.1.68), Netgear R6400v2 (firmware version up to 1.0.4.122), and Netgear R6700v3 (firmware version up to 1.0.4.122) are affected by CVE-2021-45608.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203