8.8
HIGH
CVE-2021-34982
NETGEAR Router httpd Stack-based Buffer Overflow Remote Code Execution
Description

NETGEAR Multiple Routers httpd Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple NETGEAR routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. When parsing the strings file, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-13709.

INFO

Published Date :

May 7, 2024, 11:15 p.m.

Last Modified :

Aug. 14, 2025, 1:41 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

2.8
Public PoC/Exploit Available at Github

CVE-2021-34982 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2021-34982 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Netgear ex7000_firmware
2 Netgear r6900p_firmware
3 Netgear r7000_firmware
4 Netgear r7000p_firmware
5 Netgear ex7500_firmware
6 Netgear mr60_firmware
7 Netgear ms60_firmware
8 Netgear r6400_firmware
9 Netgear r6400v2_firmware
10 Netgear r6700v3_firmware
11 Netgear r7850_firmware
12 Netgear r7900p_firmware
13 Netgear r7960p_firmware
14 Netgear r8000_firmware
15 Netgear r8000p_firmware
16 Netgear rax15_firmware
17 Netgear rax20_firmware
18 Netgear rax200_firmware
19 Netgear rax45_firmware
20 Netgear rax50_firmware
21 Netgear rax75_firmware
22 Netgear rax80_firmware
23 Netgear rs400_firmware
24 Netgear xr300_firmware
25 Netgear d6220_firmware
26 Netgear d6400_firmware
27 Netgear d7000v2_firmware
28 Netgear dc112a_firmware
29 Netgear dgn2200v4_firmware
30 Netgear ex3700_firmware
31 Netgear ex3800_firmware
32 Netgear ex6120_firmware
33 Netgear ex6130_firmware
34 Netgear r7100lg_firmware
35 Netgear r8300_firmware
36 Netgear r8500_firmware
37 Netgear wndr3400v3_firmware
38 Netgear wnr3500lv2_firmware
39 Netgear lax20_firmware
40 Netgear mr80_firmware
41 Netgear ms80_firmware
42 Netgear rax42_firmware
43 Netgear rax43_firmware
44 Netgear rax48_firmware
45 Netgear rax50s_firmware
46 Netgear xr1000_firmware
47 Netgear rax35v2_firmware
48 Netgear rax40v2_firmware
49 Netgear rax38v2_firmware
50 Netgear raxe450_firmware
51 Netgear raxe500_firmware
52 Netgear r7000
53 Netgear d6400
54 Netgear d6220
55 Netgear r6400
56 Netgear r7100lg
57 Netgear r8000
58 Netgear dgn2200v4
59 Netgear ex6120
60 Netgear ex3700
61 Netgear xr1000
62 Netgear wndr3400v3
63 Netgear ex7000
64 Netgear dc112a
65 Netgear r6900p
66 Netgear r7000p
67 Netgear r8300
68 Netgear r8500
69 Netgear r7900p
70 Netgear r8000p
71 Netgear ex3800
72 Netgear ex6130
73 Netgear ex7500
74 Netgear xr300
75 Netgear mr60
76 Netgear ms60
77 Netgear r6400v2
78 Netgear r6700v3
79 Netgear r7850
80 Netgear rax20
81 Netgear rax80
82 Netgear r7960p
83 Netgear rax15
84 Netgear rax200
85 Netgear rax45
86 Netgear rax50
87 Netgear rax75
88 Netgear rs400
89 Netgear d7000v2
90 Netgear wnr3500lv2
91 Netgear rax35v2
92 Netgear rax38v2
93 Netgear rax40v2
94 Netgear rax42
95 Netgear rax43
96 Netgear rax48
97 Netgear rax50s
98 Netgear raxe450
99 Netgear raxe500
100 Netgear lax20
101 Netgear mr80
102 Netgear ms80
103 Netgear v6510-1fxaus_firmware
104 Netgear v6510-1fxaus
References to Advisories, Solutions, and Tools

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Resources to getting started vulnerability research on IoT/embedded devices.

Updated: 14 hours, 45 minutes ago
73 stars 5 fork 5 watcher
Born at : June 30, 2023, 4:44 a.m. This repo has been linked 14 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-34982 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-34982 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Aug. 14, 2025

    Action Type Old Value New Value
    Added CWE CWE-787
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:dc112a_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.62 OR cpe:2.3:h:netgear:dc112a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:ex3700_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.94 OR cpe:2.3:h:netgear:ex3700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:ex3800_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.94 OR cpe:2.3:h:netgear:ex3800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:ex6120_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.66 OR cpe:2.3:h:netgear:ex6120:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:ex6130_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.46 OR cpe:2.3:h:netgear:ex6130:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:ex7000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.1.106 OR cpe:2.3:h:netgear:ex7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:ex7500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.1.76 OR cpe:2.3:h:netgear:ex7500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.1.6.122 OR cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:mr80_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.1.6.10 OR cpe:2.3:h:netgear:mr80:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.1.6.122 OR cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:ms80_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.1.6.10 OR cpe:2.3:h:netgear:ms80:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:lax20_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.1.6.30 OR cpe:2.3:h:netgear:lax20:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.1.76 OR cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r6400v2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.120 OR cpe:2.3:h:netgear:r6400v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r6700v3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.120 OR cpe:2.3:h:netgear:r6700v3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.3.3.148 OR cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.11.128 OR cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.3.3.148 OR cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.72 OR cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r7850_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.5.76 OR cpe:2.3:h:netgear:r7850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r7900p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.4.2.84 OR cpe:2.3:h:netgear:r7900p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.4.2.84 OR cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.76 OR cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.4.2.84 OR cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.2.156 OR cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.2.156 OR cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.100 OR cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.100 OR cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.5.132 OR cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax35v2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.100 OR cpe:2.3:h:netgear:rax35v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax38v2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.100 OR cpe:2.3:h:netgear:rax38v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax40v2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.100 OR cpe:2.3:h:netgear:rax40v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax42_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.100 OR cpe:2.3:h:netgear:rax42:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax43_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.100 OR cpe:2.3:h:netgear:rax43:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.100 OR cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax48_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.100 OR cpe:2.3:h:netgear:rax48:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.100 OR cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax50s_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.4.100 OR cpe:2.3:h:netgear:rax50s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.5.132 OR cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.5.132 OR cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:raxe450_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.8.70 OR cpe:2.3:h:netgear:raxe450:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:raxe500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.8.70 OR cpe:2.3:h:netgear:raxe500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.5.1.80 OR cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:wndr3400v3_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.1.42 OR cpe:2.3:h:netgear:wndr3400v3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:wnr3500lv2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.2.0.70 OR cpe:2.3:h:netgear:wnr3500lv2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:xr1000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.64 OR cpe:2.3:h:netgear:xr1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:xr300_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.3.68 OR cpe:2.3:h:netgear:xr300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.76 OR cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.108 OR cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:d7000v2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.76 OR cpe:2.3:h:netgear:d7000v2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:dgn2200v4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.126 OR cpe:2.3:h:netgear:dgn2200v4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:v6510-1fxaus_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.0.0.80 OR cpe:2.3:h:netgear:v6510-1fxaus:-:*:*:*:*:*:*:*
    Added Reference Type CVE: https://kb.netgear.com/000064313/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Extenders-Routers-and-DSL-Modem-Routers-PSV-2021-0159 Types: Vendor Advisory
    Added Reference Type Zero Day Initiative: https://kb.netgear.com/000064313/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Extenders-Routers-and-DSL-Modem-Routers-PSV-2021-0159 Types: Vendor Advisory
    Added Reference Type CVE: https://www.zerodayinitiative.com/advisories/ZDI-21-1274/ Types: Third Party Advisory
    Added Reference Type Zero Day Initiative: https://www.zerodayinitiative.com/advisories/ZDI-21-1274/ Types: Third Party Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://kb.netgear.com/000064313/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Extenders-Routers-and-DSL-Modem-Routers-PSV-2021-0159
    Added Reference https://www.zerodayinitiative.com/advisories/ZDI-21-1274/
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Received by [email protected]

    May. 07, 2024

    Action Type Old Value New Value
    Added Description NETGEAR Multiple Routers httpd Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple NETGEAR routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. When parsing the strings file, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-13709.
    Added Reference Zero Day Initiative https://www.zerodayinitiative.com/advisories/ZDI-21-1274/ [No types assigned]
    Added Reference Zero Day Initiative https://kb.netgear.com/000064313/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Extenders-Routers-and-DSL-Modem-Routers-PSV-2021-0159 [No types assigned]
    Added CWE Zero Day Initiative CWE-121
    Added CVSS V3 Zero Day Initiative AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-34982 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-34982 weaknesses.

CVSS30 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability