Vulnerability Details : CVE-2021-45573
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects R6260 before 1.1.0.76, R6800 before 1.2.0.62, R6700v2 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, AC2100 before 1.2.0.62, AC2400 before 1.2.0.62, and AC2600 before 1.2.0.62.
Vulnerability category: OverflowMemory Corruption
Products affected by CVE-2021-45573
- cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:ac2100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:ac2400_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:netgear:ac2600_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-45573
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-45573
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:A/AC:L/Au:N/C:P/I:P/A:P |
6.5
|
6.4
|
NIST | |
8.3
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L |
2.8
|
5.5
|
MITRE | |
8.8
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2021-45573
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-45573
-
https://kb.netgear.com/000064095/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0081
Security Advisory for Post-Authentication Command Injection on Some WiFi Systems, PSV-2020-0081 | Answer | NETGEAR SupportVendor Advisory
Jump to