Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-89v8-28p6-p87r

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

NETGEAR R7000 1.0.11.116 devices have a heap-based Buffer Overflow that is exploitable from the local network without authentication. The vulnerability exists within the handling of an HTTP request. An attacker can leverage this to execute code as root. The problem is that a user-provided length value is trusted during a backup.cgi file upload. The attacker must add a \n before the Content-Length header.

NETGEAR R7000 1.0.11.116 devices have a heap-based Buffer Overflow that is exploitable from the local network without authentication. The vulnerability exists within the handling of an HTTP request. An attacker can leverage this to execute code as root. The problem is that a user-provided length value is trusted during a backup.cgi file upload. The attacker must add a \n before the Content-Length header.

EPSS

Процентиль: 95%
0.18407
Средний

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
почти 5 лет назад

NETGEAR R7000 1.0.11.116 devices have a heap-based Buffer Overflow that is exploitable from the local network without authentication. The vulnerability exists within the handling of an HTTP request. An attacker can leverage this to execute code as root. The problem is that a user-provided length value is trusted during a backup.cgi file upload. The attacker must add a \n before the Content-Length header.

EPSS

Процентиль: 95%
0.18407
Средний

Дефекты

CWE-787