CVE-2021-20167 Scanner
CVE-2021-20167 scanner - Command Injection vulnerability in Netgear RAX43
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 3 days
Scan only one
Domain, IPv4
Toolbox
-
Netgear RAX43 is a wireless router that is designed to provide users with high-speed internet connectivity and improved network coverage. The device is used to connect multiple devices to the internet simultaneously. The powerful router is equipped with advanced features that make it suitable for creating home and office networks. Netgear RAX43 is known for its superior performance, reliability, and security, however, the recent detection of a vulnerability has raised concerns among users.
CVE-2021-20167 is a critical vulnerability that was discovered in Netgear RAX43 version 1.0.3.96. The vulnerability exists in the readycloud cgi application, and it is caused by a command injection vulnerability in the name parameter. This vulnerability can be exploited by attackers to execute arbitrary code on the router remotely. Attackers can use various methods to exploit this vulnerability, such as sending specially crafted requests to the router or using a malicious script.
If this vulnerability is exploited, attackers can gain unauthorized access to the device and take control of it. This can result in a wide range of consequences, including the theft of sensitive information, data loss, and damage to the network infrastructure. Hackers can also use the compromised router as a launching pad to conduct further attacks on other devices on the same network.
Thanks to the pro features of the s4e.io platform, users can easily and quickly learn about vulnerabilities in their digital assets. The platform provides advanced tools and resources for detecting and addressing security issues in devices, applications, and networks. With the help of the s4e.io platform, users can stay protected against the latest security threats and vulnerabilities.
REFERENCES