This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the circled daemon. A crafted circleinfo.txt file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15879.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Netgear
Subscribe
|
Cbr40
Subscribe
Cbr40 Firmware
Subscribe
Lbr1020
Subscribe
Lbr1020 Firmware
Subscribe
Lbr20
Subscribe
Lbr20 Firmware
Subscribe
R6400
Subscribe
R6400 Firmware
Subscribe
R6700
Subscribe
R6700 Firmware
Subscribe
R6900p
Subscribe
R6900p Firmware
Subscribe
R7000
Subscribe
R7000 Firmware
Subscribe
R7000p
Subscribe
R7000p Firmware
Subscribe
R7850
Subscribe
R7850 Firmware
Subscribe
R7960p
Subscribe
R7960p Firmware
Subscribe
R8000
Subscribe
R8000 Firmware
Subscribe
R8000p
Subscribe
R8000p Firmware
Subscribe
Rax200
Subscribe
Rax200 Firmware
Subscribe
Rax75
Subscribe
Rax75 Firmware
Subscribe
Rax80
Subscribe
Rax80 Firmware
Subscribe
Rbr10
Subscribe
Rbr10 Firmware
Subscribe
Rbr20
Subscribe
Rbr20 Firmware
Subscribe
Rbr40
Subscribe
Rbr40 Firmware
Subscribe
Rbr50
Subscribe
Rbr50 Firmware
Subscribe
Rbs10
Subscribe
Rbs10 Firmware
Subscribe
Rbs20
Subscribe
Rbs20 Firmware
Subscribe
Rbs40
Subscribe
Rbs40 Firmware
Subscribe
Rbs50
Subscribe
Rbs50 Firmware
Subscribe
Rs400
Subscribe
Rs400 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-32147 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the circled daemon. A crafted circleinfo.txt file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15879. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 18 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2025-02-18T17:47:05.390Z
Reserved: 2022-03-22T00:00:00.000Z
Link: CVE-2022-27646
Updated: 2024-08-03T05:32:59.786Z
Status : Modified
Published: 2023-03-29T19:15:08.707
Modified: 2024-11-21T06:56:05.500
Link: CVE-2022-27646
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD