{"containers":{"cna":{"affected":[{"product":"R7800","vendor":"NETGEAR","versions":[{"status":"affected","version":"1.0.2.76"}]}],"credits":[{"lang":"en","value":"Team FLASHBACK: Pedro Ribeiro (@pedrib1337 | pedrib@gmail.com) + Radek Domanski (@RabbitPro)"}],"descriptions":[{"lang":"en","value":"This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Nighthawk R7800. Authentication is not required to exploit this vulnerability The specific flaw exists within handling of firmware updates. The issue results from a fallback to a insecure protocol to deliver updates. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12308."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-319","description":"CWE-319: Cleartext Transmission of Sensitive Information","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-04-14T15:45:56.000Z","orgId":"99f1926a-a320-47d8-bbb5-42feb611262e","shortName":"zdi"},"references":[{"tags":["x_refsource_MISC"],"url":"https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders"},{"tags":["x_refsource_MISC"],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-247/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"zdi-disclosures@trendmicro.com","ID":"CVE-2021-27251","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"R7800","version":{"version_data":[{"version_value":"1.0.2.76"}]}}]},"vendor_name":"NETGEAR"}]}},"credit":"Team FLASHBACK: Pedro Ribeiro (@pedrib1337 | pedrib@gmail.com) + Radek Domanski (@RabbitPro)","data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Nighthawk R7800. Authentication is not required to exploit this vulnerability The specific flaw exists within handling of firmware updates. The issue results from a fallback to a insecure protocol to deliver updates. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-12308."}]},"impact":{"cvss":{"vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-319: Cleartext Transmission of Sensitive Information"}]}]},"references":{"reference_data":[{"name":"https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders","refsource":"MISC","url":"https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders"},{"name":"https://www.zerodayinitiative.com/advisories/ZDI-21-247/","refsource":"MISC","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-247/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T20:48:15.869Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://kb.netgear.com/000062883/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Satellites-and-Extenders"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-247/"}]}]},"cveMetadata":{"assignerOrgId":"99f1926a-a320-47d8-bbb5-42feb611262e","assignerShortName":"zdi","cveId":"CVE-2021-27251","datePublished":"2021-04-14T15:45:56.000Z","dateReserved":"2021-02-16T00:00:00.000Z","dateUpdated":"2024-08-03T20:48:15.869Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}