CVE-2021-33514

Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:gc108p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gc108p:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:netgear:gc108pp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gc108pp:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netgear:gs108t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs108tv3:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netgear:gs110tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs110tpp:v1:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netgear:gs110tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs110tp:v3:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netgear:gs110tup_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs110tup:v1:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netgear:gs710tup_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs710tup:v1:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netgear:gs716tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs716tp:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netgear:gs716tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs716tpp:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:netgear:gs724tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs724tpp:v1:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:netgear:gs724tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs724tp:v2:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:netgear:gs728tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs728tpp:v2:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:netgear:gs728tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs728tp:v2:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:netgear:gs752tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs752tpp:v1:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:netgear:gs752tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs752tp:v2:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:netgear:ms510txm_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ms510txm:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:netgear:ms510txup_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ms510txup:-:*:*:*:*:*:*:*

History

04 Jan 2022, 16:53

Type Values Removed Values Added
CPE cpe:2.3:h:netgear:gs108t:v3:*:*:*:*:*:*:* cpe:2.3:h:netgear:gs108tv3:-:*:*:*:*:*:*:*

27 May 2021, 20:22

Type Values Removed Values Added
CPE cpe:2.3:o:netgear:gs110tup_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gs728tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ms510txm_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs710tup:v1:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs716tpp:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gs724tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gs752tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gs716tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gs110tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gc108pp:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs108t:v3:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ms510txm:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gs110tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs752tp:v2:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs724tp:v2:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ms510txup:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gs716tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gs752tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gc108p:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gc108p_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gc108pp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs110tup:v1:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs110tp:v3:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs724tpp:v1:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ms510txup_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs110tpp:v1:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs716tp:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs728tpp:v2:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gs728tpp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs752tpp:v1:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gs724tp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gs108t_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:gs728tp:v2:*:*:*:*:*:*:*
cpe:2.3:o:netgear:gs710tup_firmware:*:*:*:*:*:*:*:*
CWE CWE-78
References (MISC) https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071 - (MISC) https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071 - Vendor Advisory
References (MISC) https://gynvael.coldwind.pl/?lang=en&id=733 - (MISC) https://gynvael.coldwind.pl/?lang=en&id=733 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 10.0
v3 : 9.8

21 May 2021, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-21 23:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-33514

Mitre link : CVE-2021-33514

CVE.ORG link : CVE-2021-33514


JSON object : View

Products Affected

netgear

  • gs752tpp_firmware
  • gs716tpp
  • ms510txup
  • ms510txup_firmware
  • ms510txm_firmware
  • gs108tv3
  • gs110tup_firmware
  • gs724tpp
  • gc108p_firmware
  • gc108p
  • gs110tup
  • gs724tp
  • gs110tp_firmware
  • gs752tpp
  • gs710tup_firmware
  • gs710tup
  • gs752tp_firmware
  • gs716tpp_firmware
  • gs110tp
  • gs716tp_firmware
  • gs752tp
  • gs110tpp_firmware
  • gs716tp
  • gc108pp_firmware
  • gs724tp_firmware
  • ms510txm
  • gs728tpp_firmware
  • gs724tpp_firmware
  • gs728tpp
  • gc108pp
  • gs728tp
  • gs728tp_firmware
  • gs108t_firmware
  • gs110tpp
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')