Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-20167

EPSS 79.42% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-20167

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Netgear RAX43 version 1.0.3.96 contains a command injection vulnerability. The readycloud cgi application is vulnerable to command injection in the name parameter.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Netgear RAX43 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Netgear RAX43是美国网件(Netgear)公司的一款无线路由器。 Netgear RAX43存在命令注入漏洞,该漏洞源于包含命令注入漏洞。 readycloud cgi 应用程序在 name 参数中容易受到命令注入的影响。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-Netgear RAX43 1.0.3.96 -

II. Public POCs for CVE-2021-20167

#POC DescriptionSource LinkShenlong Link
1Netgear RAX43 version 1.0.3.96 contains a command injection and authentication bypass vulnerability. The readycloud_control.cgi CGI application is vulnerable to command injection in the name parameter. Additionally, the URL parsing functionality in the cgi-bin endpoint of the router containers a buffer overrun issue that can redirection control flow of the application. Note: This vulnerability uses a combination of CVE-2021-20166 and CVE-2021-20167.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-20167.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-20167

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-12-30 · 39 CVEs total

CVE-2021-20156Trendnet AC2600 数据伪造问题漏洞
CVE-2021-20162Trendnet AC2600 安全漏洞
CVE-2021-20160Trendnet AC2600 操作系统命令注入漏洞
CVE-2021-20155Trendnet AC2600 信任管理问题漏洞
CVE-2021-20153Trendnet AC2600 后置链接漏洞
CVE-2021-20154Trendnet AC2600 安全漏洞
CVE-2021-20152Trendnet AC2600 访问控制错误漏洞
CVE-2021-20159Trendnet AC2600 操作系统命令注入漏洞
CVE-2021-20157Trendnet AC2600 安全漏洞
CVE-2021-20158Trendnet AC2600 访问控制错误漏洞
CVE-2021-20161Trendnet AC2600 访问控制错误漏洞
CVE-2021-20134D-Link DIR-2640 路径遍历漏洞
CVE-2021-20132D-Link DIR-2640 信任管理问题漏洞
CVE-2021-20133D-Link DIR-2640 路径遍历漏洞
CVE-2021-45379Glewlwyd SSO server 授权问题漏洞
CVE-2020-29292Iball WRD12EN 跨站请求伪造漏洞
CVE-2021-45815Quectel UC20 跨站脚本漏洞
CVE-2021-45818SAFARI Montage 注入漏洞
CVE-2021-45427Emerson XWEB 300D EVO 路径遍历漏洞
CVE-2021-20166Netgear RAX43 缓冲区错误漏洞

Showing top 20 of 39 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-20167

No comments yet


Leave a comment