Code Execution Vulnerability in NETGEAR Routers
CVE-2022-27646
8HIGH
Summary
This vulnerability in NETGEAR R6700v3 routers enables attackers positioned on the same network to execute arbitrary code through a crafted circleinfo.txt file. While an authentication mechanism is present, it can be bypassed due to a flaw in the circled daemon, leading to a stack-based buffer overflow. Successful exploitation allows attackers to run code with root privileges, posing significant risks to system integrity and security.
Affected Version(s)
R6700v3 1.0.4.120_10.0.91
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Kevin Denis (@0xmitsurugi) and Antide Petit (@xarkes_) from @Synacktiv