Metrics
No CVSS v4.0
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00064.
Exploitation none
Automatable no
Technical Impact total
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Netgear
Subscribe
|
Cax80
Subscribe
Cax80 Firmware
Subscribe
Lax20
Subscribe
Lax20 Firmware
Subscribe
Mr60
Subscribe
Mr60 Firmware
Subscribe
Mr80
Subscribe
Mr80 Firmware
Subscribe
Ms60
Subscribe
Ms60 Firmware
Subscribe
Ms80
Subscribe
Ms80 Firmware
Subscribe
R6400
Subscribe
R6400 Firmware
Subscribe
R6700
Subscribe
R6700 Firmware
Subscribe
R6900p
Subscribe
R6900p Firmware
Subscribe
R7000
Subscribe
R7000 Firmware
Subscribe
R7000p
Subscribe
R7000p Firmware
Subscribe
R7100lg
Subscribe
R7100lg Firmware
Subscribe
R7850
Subscribe
R7850 Firmware
Subscribe
R7900p
Subscribe
R7900p Firmware
Subscribe
R7960p
Subscribe
R7960p Firmware
Subscribe
R8000
Subscribe
R8000 Firmware
Subscribe
R8000p
Subscribe
R8000p Firmware
Subscribe
R8500
Subscribe
R8500 Firmware
Subscribe
Rax15
Subscribe
Rax15 Firmware
Subscribe
Rax20
Subscribe
Rax200
Subscribe
Rax200 Firmware
Subscribe
Rax20 Firmware
Subscribe
Rax35
Subscribe
Rax35 Firmware
Subscribe
Rax38
Subscribe
Rax38 Firmware
Subscribe
Rax40
Subscribe
Rax40 Firmware
Subscribe
Rax42
Subscribe
Rax42 Firmware
Subscribe
Rax43
Subscribe
Rax43 Firmware
Subscribe
Rax45
Subscribe
Rax45 Firmware
Subscribe
Rax48
Subscribe
Rax48 Firmware
Subscribe
Rax50
Subscribe
Rax50 Firmware
Subscribe
Rax50s
Subscribe
Rax50s Firmware
Subscribe
Rax75
Subscribe
Rax75 Firmware
Subscribe
Rax80
Subscribe
Rax80 Firmware
Subscribe
Rs400
Subscribe
Rs400 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
Configuration 34 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-32148 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the name or email field provided to libreadycloud.so. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15874. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 18 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2025-02-18T17:41:07.125Z
Reserved: 2022-03-22T00:00:00.000Z
Link: CVE-2022-27647
Updated: 2024-08-03T05:32:59.969Z
Status : Modified
Published: 2023-03-29T19:15:08.773
Modified: 2024-11-21T06:56:05.650
Link: CVE-2022-27647
No data.
OpenCVE Enrichment
No data.
EUVD