cve/2021/CVE-2021-20166.md

18 lines
724 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-20166](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20166)
![](https://img.shields.io/static/v1?label=Product&message=Netgear%20RAX43&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Buffer%20Overrun&color=brighgreen)
### Description
Netgear RAX43 version 1.0.3.96 contains a buffer overrun vulnerability. The URL parsing functionality in the cgi-bin endpoint of the router containers a buffer overrun issue that can redirection control flow of the applicaiton.
### POC
#### Reference
- https://www.tenable.com/security/research/tra-2021-55
#### Github
No PoCs found on GitHub currently.