CVE-2021-47774

9.8 CRITICAL

📋 TL;DR

Kingdia CD Extractor 3.0.2 contains a critical buffer overflow vulnerability in its registration name field that allows remote attackers to execute arbitrary code on affected systems. Attackers can craft malicious payloads exceeding 256 bytes to overwrite the Structured Exception Handler and gain remote code execution through a bind shell. This affects all users running the vulnerable version of Kingdia CD Extractor.

💻 Affected Systems

Products:
  • Kingdia CD Extractor
Versions: 3.0.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the registration name field functionality and is exploitable in default installations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution, allowing attackers to install malware, steal data, pivot to other systems, or establish persistent backdoors.

🟠

Likely Case

Remote code execution leading to system compromise, data theft, or ransomware deployment on vulnerable systems.

🟢

If Mitigated

Limited impact if proper network segmentation, application whitelisting, and least privilege principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available on Exploit-DB (ID: 50470), making this easily weaponizable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://kingdia-cd-extractor.informer.com/

Restart Required: No

Instructions:

1. Check vendor website for updated version. 2. If no patch available, uninstall Kingdia CD Extractor 3.0.2. 3. Replace with alternative software if CD extraction functionality is required.

🔧 Temporary Workarounds

Uninstall Vulnerable Software

windows

Remove Kingdia CD Extractor 3.0.2 from all systems

Control Panel > Programs > Uninstall a program > Select Kingdia CD Extractor > Uninstall

Network Segmentation

all

Isolate systems running Kingdia CD Extractor from critical networks

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of Kingdia CD Extractor
  • Deploy endpoint detection and response (EDR) solutions with behavioral monitoring for exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check installed programs for Kingdia CD Extractor version 3.0.2 via Control Panel or 'wmic product get name,version' command

Check Version:

wmic product where "name like '%Kingdia CD Extractor%'" get name,version

Verify Fix Applied:

Verify Kingdia CD Extractor 3.0.2 is no longer installed on the system

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for Kingdia CD Extractor with abnormal parameters
  • Network connections from Kingdia CD Extractor to unusual ports

Network Indicators:

  • Unusual outbound connections from systems running Kingdia CD Extractor
  • Traffic patterns matching exploit payloads

SIEM Query:

process_name:"Kingdia CD Extractor.exe" AND (process_args_length:>256 OR network_connection:*)

🔗 References

📤 Share & Export