Severity
8.8HIGH
EPSS
0.1%
top 65.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 29

Description

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within readycloud_control.cgi. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15762.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages24 packages

CVEListV5netgear/r6700v31.0.4.120_10.0.91
NVDnetgear/lax20_firmware< 1.1.6.34
NVDnetgear/r6400_firmware< 1.0.4.126
NVDnetgear/r6700_firmware< 1.0.4.126
NVDnetgear/r7000_firmware< 1.0.11.134

🔴Vulnerability Details

2
GHSA
GHSA-jv3h-vgc4-3286: This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 12023-03-29
CVEList
CVE-2022-27645: This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 routers2023-03-29
CVE-2022-27645 (HIGH CVSS 8.8) | This vulnerability allows network-a | cvebase.io