CVE-2021-33514
Summary
| CVE | CVE-2021-33514 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-05-21 23:15:00 UTC |
| Updated | 2022-01-04 16:53:00 UTC |
| Description | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3. |
Risk And Classification
Problem Types: CWE-78
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Netgear | Gc108p | - | All | All | All |
| Hardware | Netgear | Gc108pp | - | All | All | All |
| Operating System | Netgear | Gc108pp Firmware | All | All | All | All |
| Operating System | Netgear | Gc108p Firmware | All | All | All | All |
| Hardware | Netgear | Gs108t | v3 | All | All | All |
| Hardware | Netgear | Gs108tv3 | - | All | All | All |
| Operating System | Netgear | Gs108t Firmware | All | All | All | All |
| Hardware | Netgear | Gs110tp | v3 | All | All | All |
| Hardware | Netgear | Gs110tpp | v1 | All | All | All |
| Operating System | Netgear | Gs110tpp Firmware | All | All | All | All |
| Operating System | Netgear | Gs110tp Firmware | All | All | All | All |
| Hardware | Netgear | Gs110tup | v1 | All | All | All |
| Operating System | Netgear | Gs110tup Firmware | All | All | All | All |
| Hardware | Netgear | Gs710tup | v1 | All | All | All |
| Operating System | Netgear | Gs710tup Firmware | All | All | All | All |
| Hardware | Netgear | Gs716tp | - | All | All | All |
| Hardware | Netgear | Gs716tpp | - | All | All | All |
| Operating System | Netgear | Gs716tpp Firmware | All | All | All | All |
| Operating System | Netgear | Gs716tp Firmware | All | All | All | All |
| Hardware | Netgear | Gs724tp | v2 | All | All | All |
| Hardware | Netgear | Gs724tpp | v1 | All | All | All |
| Operating System | Netgear | Gs724tpp Firmware | All | All | All | All |
| Operating System | Netgear | Gs724tp Firmware | All | All | All | All |
| Hardware | Netgear | Gs728tp | v2 | All | All | All |
| Hardware | Netgear | Gs728tpp | v2 | All | All | All |
| Operating System | Netgear | Gs728tpp Firmware | All | All | All | All |
| Operating System | Netgear | Gs728tp Firmware | All | All | All | All |
| Hardware | Netgear | Gs752tp | v2 | All | All | All |
| Hardware | Netgear | Gs752tpp | v1 | All | All | All |
| Operating System | Netgear | Gs752tpp Firmware | All | All | All | All |
| Operating System | Netgear | Gs752tp Firmware | All | All | All | All |
| Hardware | Netgear | Ms510txm | - | All | All | All |
| Operating System | Netgear | Ms510txm Firmware | All | All | All | All |
| Hardware | Netgear | Ms510txup | - | All | All | All |
| Operating System | Netgear | Ms510txup Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Security Advisory for Pre-Authentication Command Injection Vulnerability on Some Smart Switches, PSV-2021-0071 | Answer | NETGEAR Support | MISC | kb.netgear.com | |
| Feral Terror vulnerability (some NETGEAR smart switches) [UPDATED] - gynvael.coldwind//vx.log | MISC | gynvael.coldwind.pl | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.