First published: Sun Dec 26 2021(Updated: )
Certain D-Link, Edimax, NETGEAR, TP-Link, Tenda, and Western Digital devices are affected by an integer overflow by an unauthenticated attacker. Remote code execution from the WAN interface (TCP port 20005) cannot be ruled out; however, exploitability was judged to be of "rather significant complexity" but not "impossible." The overflow is in SoftwareBus_dispatchNormalEPMsgOut in the KCodes NetUSB kernel module. Affected NETGEAR devices are D7800 before 1.0.1.68, R6400v2 before 1.0.4.122, and R6700v3 before 1.0.4.122.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D7800 Firmware | <1.0.1.68 | |
Netgear D7800 | ||
Netgear R6400v2 Firmware | <1.0.4.122 | |
NETGEAR R6400v2 | ||
Netgear R6700v3 Firmware | <1.0.4.122 | |
NETGEAR R6700v3 |
https://www.sentinelone.com/labs/cve-2021-45608-netusb-rce-flaw-in-millions-of-end-user-routers/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45608 refers to an integer overflow vulnerability affecting certain D-Link, Edimax, NETGEAR, TP-Link, Tenda, and Western Digital devices.
The severity of CVE-2021-45608 is rated as critical with a CVSS score of 9.8.
Certain D-Link, Edimax, NETGEAR, TP-Link, Tenda, and Western Digital devices are affected by CVE-2021-45608.
An unauthenticated attacker can potentially exploit CVE-2021-45608 to execute remote code from the WAN interface (TCP port 20005).
Netgear D7800 (firmware version up to 1.0.1.68), Netgear R6400v2 (firmware version up to 1.0.4.122), and Netgear R6700v3 (firmware version up to 1.0.4.122) are affected by CVE-2021-45608.