The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-35392

CVE-2021-35392: Realtek Jungle SDK Buffer Overflow Flaw

CVE-2021-35392 is a heap buffer overflow vulnerability in Realtek Jungle SDK's WiFi Simple Config server. Attackers can exploit unsafe SSDP message handling to compromise systems. This article covers technical details, affected versions, impact, and mitigation strategies.

Updated: May 16, 2026

CVE-2021-35392 Overview

CVE-2021-35392 is a heap buffer overflow in the Realtek Jungle Software Development Kit (SDK) versions v2.x through v3.4.14B. The flaw resides in the WiFi Simple Config server, distributed as wscd or mini_upnpd, which implements the Universal Plug and Play (UPnP) and Simple Service Discovery Protocol (SSDP) services. The server unsafely crafts SSDP NOTIFY messages from the ST header of incoming M-SEARCH requests. Remote attackers reachable on the network can send a malformed M-SEARCH packet to corrupt the heap. The vulnerability affects a wide range of consumer and embedded routers because the Realtek SDK is redistributed across dozens of OEM firmware images.

Critical Impact

Unauthenticated network attackers can corrupt heap memory in the UPnP/SSDP daemon, leading to service crash and potential code execution paths on affected Realtek-based devices.

Affected Products

  • Realtek rtl819x_jungle_software_development_kit versions v2.x up to v3.4.14B
  • OEM router firmware bundling the wscd WiFi Simple Config binary
  • OEM router firmware bundling the mini_upnpd binary (successor to miniigd)

Discovery Timeline

  • 2021-08-16 - CVE-2021-35392 published to the National Vulnerability Database (NVD)
  • 2025-08-13 - Last updated in the NVD database

Technical Details for CVE-2021-35392

Vulnerability Analysis

The WiFi Simple Config server listens for SSDP traffic on UDP port 1900. When an M-SEARCH discovery request arrives, the server extracts the ST (Search Target) header value and embeds it into an outbound SSDP NOTIFY response. The routine that builds the response writes attacker-controlled ST data into a fixed-size heap buffer without validating the input length. A long ST header overflows the buffer, corrupting adjacent heap metadata and program data. The weakness is classified as an out-of-bounds write under [CWE-787].

Because the SSDP service is exposed by default on the LAN interface, and in some OEM configurations on the WAN interface, any host capable of reaching UDP/1900 can trigger the overflow without authentication or user interaction.

Root Cause

The root cause is missing bounds checking when concatenating the received ST value into the response buffer. The Realtek SDK code path assumes the ST field conforms to a short, well-formed URN string, so it neither truncates the input nor validates length against the destination buffer size before the copy operation.

Attack Vector

An attacker sends a single UDP M-SEARCH datagram to port 1900 containing an oversized ST header. The malformed value flows directly into the heap buffer that builds the SSDP NOTIFY reply. The overflow can crash wscd or mini_upnpd, denying network services on the device. Depending on the heap layout and target architecture, the same primitive has been used in public research to pivot toward arbitrary code execution on MIPS and ARM Realtek-based devices.

No verified public code example is included here. Refer to the IoT Inspector Advisory on Realtek SDK and the Realtek SDK Advisory CVE-2021-35392 for technical analysis.

Detection Methods for CVE-2021-35392

Indicators of Compromise

  • Repeated crashes or restarts of the wscd or mini_upnpd process on Realtek-based devices
  • Inbound UDP traffic to port 1900 containing M-SEARCH requests with abnormally long ST headers
  • Unexpected SSDP NOTIFY traffic originating from edge routers shortly after malformed discovery requests

Detection Strategies

  • Inspect network traffic for SSDP M-SEARCH packets where the ST header length exceeds typical URN values (commonly 64 bytes)
  • Identify exposed UDP/1900 services on the WAN side using external attack-surface scans
  • Correlate device watchdog reboots with preceding inbound SSDP traffic in firewall logs

Monitoring Recommendations

  • Enable NetFlow or packet capture on perimeter devices for UDP/1900 to baseline normal SSDP volume
  • Alert on UPnP traffic crossing network segmentation boundaries where it should not be permitted
  • Track firmware versions across the device fleet to identify hosts running vulnerable Realtek SDK builds

How to Mitigate CVE-2021-35392

Immediate Actions Required

  • Identify all routers, access points, and IoT devices built on the Realtek rtl819x Jungle SDK
  • Block external access to UDP port 1900 at the network perimeter
  • Disable UPnP on affected devices when the feature is not required for business operations
  • Apply OEM firmware updates that incorporate the patched Realtek SDK

Patch Information

Realtek published a fixed SDK and coordinated with downstream OEMs. Refer to the Realtek SDK Advisory CVE-2021-35392 for the official advisory and to the device manufacturer for firmware images that incorporate the corrected wscd / mini_upnpd binary. Devices running Realtek Jungle SDK versions later than v3.4.14B with vendor patches applied are no longer vulnerable.

Workarounds

  • Disable the WiFi Simple Config / UPnP service on the device management interface when feasible
  • Filter inbound UDP/1900 at upstream firewalls so SSDP traffic cannot reach the device from untrusted networks
  • Place vulnerable embedded devices on isolated VLANs to limit lateral exposure until firmware updates are applied
bash
# Example perimeter firewall rule to block external SSDP traffic
iptables -A INPUT -p udp --dport 1900 -i eth_wan -j DROP
iptables -A FORWARD -p udp --dport 1900 -i eth_wan -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechRealtek

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability73.55%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-787
  • Technical References
  • IoT Inspector Advisory on Realtek SDK
  • Vendor Resources
  • Realtek Corporate Page

  • Realtek SDK Advisory CVE-2021-35392
  • Related CVEs
  • CVE-2026-36355: Realtek rtl819x Information Disclosure

  • CVE-2019-25345: Realtek IIS Codec Privilege Escalation

  • CVE-2020-36974: Realtek Andrea RT Filters Privilege Escalation

  • CVE-2021-35394: Realtek Jungle SDK RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English