CVE-2021-35395

Description from NVD

Realtek Jungle SDK version v2.x up to v3.4.14B provides an HTTP web server exposing a management interface that can be used to configure the access point. Two versions of this management interface exists: one based on Go-Ahead named webs and another based on Boa named boa. Both of them are affected by these vulnerabilities. Specifically, these binaries are vulnerable to the following issues: - stack buffer overflow in formRebootCheck due to unsafe copy of submit-url parameter - stack buffer overflow in formWsc due to unsafe copy of submit-url parameter - stack buffer overflow in formWlanMultipleAP due to unsafe copy of submit-url parameter - stack buffer overflow in formWlSiteSurvey due to unsafe copy of ifname parameter - stack buffer overflow in formStaticDHCP due to unsafe copy of hostname parameter - stack buffer overflow in formWsc due to unsafe copy of 'peerPin' parameter - arbitrary command execution in formSysCmd via the sysCmd parameter - arbitrary command injection in formWsc via the 'peerPin' parameter Exploitability of identified issues will differ based on what the end vendor/manufacturer did with the Realtek SDK webserver. Some vendors use it as-is, others add their own authentication implementation, some kept all the features from the server, some remove some of them, some inserted their own set of features. However, given that Realtek SDK implementation is full of insecure calls and that developers tends to re-use those examples in their custom code, any binary based on Realtek SDK webserver will probably contains its own set of issues on top of the Realtek ones (if kept). Successful exploitation of these issues allows remote attackers to gain arbitrary code execution on the device.

Information Acquisition Date:2021-09-02T14:55Z
CVSS 2.0: 10.0 HIGH CVSS 3.x: 9.8 CRITICAL

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

▼ CVSS2 Vec AV:N/AC:L/Au:N/C:C/I:C/A:C

NVD References

 https://www.realtek.com/en/cu-1-en/cu-1-taiwan-en
     source:MISC
     tags:Patch    Vendor Advisory    
 https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain
     source:MISC
     tags:Exploit    Third Party Advisory    
 https://www.realtek.com/images/safe-report/Realtek_APRouter_SDK_Advisory-CVE-2021-35392_35395.pdf
     source:MISC
     tags:Patch    

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag: Windows(2 tweets)



List of frequently cited URLs

URLNum of Times Referred to
https://lists.astaro.com/ASGV9-IPS-rules.html25
https://www.helpnetsecurity.com/2021/08/24/cve-2021-35395-e...13
https://blogs.juniper.net/en-us/threat-research/realtek-cve...9
https://www.realtek.com/images/safe-report/Realtek_APRouter...7
https://twitter.com/bad_packets/status/14300139503645859915
https://www.iot-inspector.com/blog/advisory-multiple-issues...5
https://ipssignatures.appspot.com/?cve=CVE-2021-353953

▼ Show Information from Twitter(104)


List of frequently cited URLs

URLNum of Times Referred to
lists.astaro.com25
www.helpnetsecurity.com13
blogs.juniper.net9
www.realtek.com7
twitter.com5
www.iot-inspector.com5
ipssignatures.appspot.com3

▼ Show Information from Twitter(104)


GitHub Search Results: Up to 10
NameURL
No Data

GitHub Search Results: Up to 10
NameURL
No Data

2021/09/08 Score : 2
Added Har-sia Database : 2021/08/16
Last Modified : 2021/09/08
Highest Scored Date : 2021/08/24
Highest Score : 29