CVE-2021-27253

HIGH

NETGEAR Nighthawk R7800 - Code Injection

Title source: llm
STIX 2.1

Description

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Nighthawk R7800. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the rc_service parameter provided to apply_bind.cgi. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12303.

References (2)

Core 2

Scores

CVSS v3 8.8
EPSS 0.0074
EPSS Percentile 73.0%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-122 CWE-787
Status published
Products (43)
netgear/br200_firmware < 5.10.0.5
netgear/br500_firmware < 5.10.0.5
netgear/d7800_firmware < 1.0.1.60
netgear/ex6100v2_firmware < 1.0.1.98
netgear/ex6150_firmware < 1.0.1.98
netgear/ex6250_firmware < 1.0.0.134
netgear/ex6400_firmware < 1.0.2.158
netgear/ex6400v2_firmware < 1.0.0.134
netgear/ex6410_firmware < 1.0.0.134
netgear/ex6420_firmware < 1.0.0.134
... and 33 more
Published Apr 14, 2021
Tracked Since Feb 18, 2026