CVE-2021-35394

Analyzed
Published: 16 Aug 2021, 11:07
Last modified:21 Oct 2025, 23:25

Vulnerability Summary

Overall Risk (default)
critical
90/100
CVSS Score
10 HIGH
v2.0 (nvd)
EPSS Score
93.8% CRITICAL
94% probability -0.42%
KEV
Listed
CIRCL • CISA
2 listings
Ransomware
No reports
Public exploits
1 found
Dark Web
Not detected

Timeline

16 Aug 2021, 11:07
Published
Vulnerability first disclosed
10 Dec 2021, 00:00
Added to CISA KEV
Realtek Jungle SDK Remote Code Execution Vulnerability
24 Dec 2021, 00:00
CISA Remediation Due
Apply updates per vendor instructions.
21 Oct 2025, 23:25
Last Modified
Vulnerability information updated
12 Mar 2026, 00:00
Added to CIRCL KEV
Added to Known Exploited Vulnerabilities catalog

Description

Realtek Jungle SDK version v2.x up to v3.4.14B provides a diagnostic tool called 'MP Daemon' that is usually compiled as 'UDPServer' binary. The binary is affected by multiple memory corruption vulnerabilities and an arbitrary command injection vulnerability that can be exploited by remote unauthenticated attackers.

CVSS Metrics

  • v3.1CRITICALScore: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • v2.0HIGHScore: 10AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS Trends

Current EPSS score: 93.80% Percentile: 100%

Techniques & Countermeasures

  • CWE-78Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

    The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

Affected Systems

  • realtekrtl819x_jungle_software_development_kit

    ≥ 2.0, ≤ 3.4.14b

References (5)