CVE-2022-27646
29.03.2023, 19:15
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the circled daemon. A crafted circleinfo.txt file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15879.Enginsight
Vendor | Product | Version |
---|---|---|
netgear | r6400_firmware | 𝑥 < 1.0.4.126 |
netgear | r6700_firmware | 𝑥 < 1.0.4.126 |
netgear | r6900p_firmware | 𝑥 < 1.3.3.148 |
netgear | r7000_firmware | 𝑥 < 1.0.11.134 |
netgear | r7000p_firmware | 𝑥 < 1.3.3.148 |
netgear | r7850_firmware | 𝑥 < 1.0.5.84 |
netgear | r7960p_firmware | 𝑥 < 1.4.3.88 |
netgear | r8000_firmware | 𝑥 < 1.0.4.84 |
netgear | r8000p_firmware | 𝑥 < 1.4.3.88 |
netgear | rax200_firmware | 𝑥 < 1.0.6.138 |
netgear | rax75_firmware | 𝑥 < 1.0.6.138 |
netgear | rax80_firmware | 𝑥 < 1.0.6.138 |
netgear | rs400_firmware | 𝑥 < 1.5.1.86 |
netgear | cbr40_firmware | 𝑥 < 2.5.0.28 |
netgear | lbr1020_firmware | 𝑥 < 2.7.4.2 |
netgear | lbr20_firmware | 𝑥 < 2.7.4.2 |
netgear | rbr10_firmware | 𝑥 < 2.7.4.24 |
netgear | rbr20_firmware | 𝑥 < 2.7.4.24 |
netgear | rbr40_firmware | 𝑥 < 2.7.4.24 |
netgear | rbr50_firmware | 𝑥 < 2.7.4.24 |
netgear | rbs10_firmware | 𝑥 < 2.7.4.24 |
netgear | rbs20_firmware | 𝑥 < 2.7.4.24 |
netgear | rbs40_firmware | 𝑥 < 2.7.4.24 |
netgear | rbs50_firmware | 𝑥 < 2.7.4.24 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References