### [CVE-2021-20045](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20045) ![](https://img.shields.io/static/v1?label=Product&message=SonicWall%20SMA100&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=10.2.0.8-37sv%20and%20earlier%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2.1.1-19sv%20and%20earlier%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.2.1.2-24sv%20and%20earlier%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brightgreen) ### Description A buffer overflow vulnerability in SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method allows a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances. ### POC #### Reference No PoCs from references. #### Github - https://github.com/UNC1739/awesome-vulnerability-research