CVE-2022-27646

Severity
8.8HIGH
EPSS
1.7%
top 17.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 29

Description

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the circled daemon. A crafted circleinfo.txt file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages25 packages

CVEListV5netgear/r6700v31.0.4.120_10.0.91
NVDnetgear/cbr40_firmware< 2.5.0.28
NVDnetgear/lbr20_firmware< 2.7.4.2
NVDnetgear/r6400_firmware< 1.0.4.126
NVDnetgear/r6700_firmware< 1.0.4.126

🔴Vulnerability Details

2
CVEList
CVE-2022-27646: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 12023-03-29
GHSA
GHSA-qjg8-7gjq-vxf4: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 12023-03-29