netgear prosafe-network-management-system CVE-2021-27273 is a vulnerability in Netgear Prosafe Network Management System
Published on March 29, 2021

This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the SettingConfigController class. When parsing the fileName parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-12121.

NVD

Weakness Type

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2021-27273 has been classified to as a Shell injection vulnerability or weakness.


Products Associated with CVE-2021-27273

Want to know whenever a new CVE is published for Netgear Prosafe Network Management System? stack.watch will email you.

 

Affected Versions

NETGEAR ProSAFE Network Management System Version 1.6.0.26 is affected by CVE-2021-27273

Exploit Probability

EPSS
79.16%
Percentile
99.04%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.