Code Execution Vulnerability in NETGEAR Routers
CVE-2022-27646 
8HIGH
What is CVE-2022-27646?
This vulnerability in NETGEAR R6700v3 routers enables attackers positioned on the same network to execute arbitrary code through a crafted circleinfo.txt file. While an authentication mechanism is present, it can be bypassed due to a flaw in the circled daemon, leading to a stack-based buffer overflow. Successful exploitation allows attackers to run code with root privileges, posing significant risks to system integrity and security.
Affected Version(s)
R6700v3 1.0.4.120_10.0.91
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
 High
Availability:
 High
Attack Vector:
Adjacent Network
Attack Complexity:
 Low
Privileges Required:
 Low
User Interaction:
 None
Scope:
 Unchanged
CVSS V3.0
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
 High
Availability:
 High
Attack Vector:
Adjacent Network
Attack Complexity:
 Low
Privileges Required:
 Low
User Interaction:
 None
Scope:
 Unchanged
Timeline
- Vulnerability published 
- Vulnerability Reserved 
Credit
Kevin Denis (@0xmitsurugi) and Antide Petit (@xarkes_) from @Synacktiv