This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the name or email field provided to libreadycloud.so. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15874.

Project Subscriptions

Vendors Products
Netgear Subscribe
Cax80 Firmware Subscribe
Lax20 Firmware Subscribe
Mr60 Firmware Subscribe
Mr80 Firmware Subscribe
Ms60 Firmware Subscribe
Ms80 Firmware Subscribe
R6400 Firmware Subscribe
R6700 Firmware Subscribe
R6900p Firmware Subscribe
R7000 Firmware Subscribe
R7000p Firmware Subscribe
R7100lg Subscribe
R7100lg Firmware Subscribe
R7850 Firmware Subscribe
R7900p Firmware Subscribe
R7960p Firmware Subscribe
R8000 Firmware Subscribe
R8000p Firmware Subscribe
R8500 Firmware Subscribe
Rax15 Firmware Subscribe
Rax200 Firmware Subscribe
Rax20 Firmware Subscribe
Rax35 Firmware Subscribe
Rax38 Firmware Subscribe
Rax40 Firmware Subscribe
Rax42 Firmware Subscribe
Rax43 Firmware Subscribe
Rax45 Firmware Subscribe
Rax48 Firmware Subscribe
Rax50 Firmware Subscribe
Rax50s Firmware Subscribe
Rax75 Firmware Subscribe
Rax80 Firmware Subscribe
Rs400 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-32148 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the name or email field provided to libreadycloud.so. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15874.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 18 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2025-02-18T17:41:07.125Z

Reserved: 2022-03-22T00:00:00.000Z

Link: CVE-2022-27647

cve-icon Vulnrichment

Updated: 2024-08-03T05:32:59.969Z

cve-icon NVD

Status : Modified

Published: 2023-03-29T19:15:08.773

Modified: 2024-11-21T06:56:05.650

Link: CVE-2022-27647

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses