Netgear R6700V3 vulnerabilities
7 known vulnerabilities affecting netgear/r6700v3.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH7
Vulnerabilities
Page 1 of 1
CVE-2022-27644HIGHCVSS 8.8v1.0.4.120_10.0.912023-03-29
CVE-2022-27644 [HIGH] CWE-295 CVE-2022-27644: This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded infor
This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper va
cvelistv5nvd
CVE-2022-27647HIGHCVSS 8.0v1.0.4.120_10.0.912023-03-29
CVE-2022-27647 [HIGH] CWE-78 CVE-2022-27647: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installat
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the name or email field provided
cvelistv5nvd
CVE-2022-27641HIGHCVSS 8.8v1.0.4.120_10.0.912023-03-29
CVE-2022-27641 [HIGH] CWE-190 CVE-2022-27641: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installat
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB module. The issue results from the lack of proper validation of user-supplied data, which can res
cvelistv5nvd
CVE-2022-27646HIGHCVSS 8.8v1.0.4.120_10.0.912023-03-29
CVE-2022-27646 [HIGH] CWE-121 CVE-2022-27646: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installat
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the circled daemon. A crafted circleinfo.txt fil
cvelistv5nvd
CVE-2022-27642HIGHCVSS 8.8v1.0.4.120_10.0.912023-03-29
CVE-2022-27642 [HIGH] CWE-863 CVE-2022-27642: This vulnerability allows network-adjacent attackers to bypass authentication on affected installati
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service. The issue results from incorrect string matching logic when accessing protected pages. An
cvelistv5nvd
CVE-2022-27645HIGHCVSS 8.8v1.0.4.120_10.0.912023-03-29
CVE-2022-27645 [HIGH] CWE-306 CVE-2022-27645: This vulnerability allows network-adjacent attackers to bypass authentication on affected installati
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within readycloud_control.cgi. The issue results from the lack of authentication prior to allowing access to functionality. An attacke
cvelistv5nvd
CVE-2022-27643HIGHCVSS 8.8v1.0.4.120_10.0.912023-03-29
CVE-2022-27643 [HIGH] CWE-120 CVE-2022-27643: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installat
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate th
cvelistv5nvd