.. / CVE-2021-20167

Exploit for Netgear RAX43 1.0.3.96 - Command Injection/Authentication Bypass Buffer Overrun (CVE-2021-20167)

Description:

Netgear RAX43 version 1.0.3.96 contains a command injection and authentication bypass vulnerability. The readycloud_control.cgi CGI application is vulnerable to command injection in the name parameter. Additionally, the URL parsing functionality in the cgi-bin endpoint of the router containers a buffer overrun issue that can redirection control flow of the application. Note: This vulnerability uses a combination of CVE-2021-20166 and CVE-2021-20167.

Nuclei Template

View the template here CVE-2021-20167.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-20167.yaml
Copy

References:

https://www.tenable.com/security/research/tra-2021-55
https://nvd.nist.gov/vuln/detail/CVE-2021-20166
https://github.com/ARPSyndicate/cvemon
https://github.com/ARPSyndicate/kenzer-templates
https://nvd.nist.gov/vuln/detail/CVE-2021-20167