Code Execution Vulnerability in NETGEAR Routers
CVE-2022-27646

8HIGH

Key Information:

Vendor
Netgear
Status
Vendor
CVE Published:
29 March 2023

Summary

This vulnerability in NETGEAR R6700v3 routers enables attackers positioned on the same network to execute arbitrary code through a crafted circleinfo.txt file. While an authentication mechanism is present, it can be bypassed due to a flaw in the circled daemon, leading to a stack-based buffer overflow. Successful exploitation allows attackers to run code with root privileges, posing significant risks to system integrity and security.

Affected Version(s)

R6700v3 1.0.4.120_10.0.91

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Kevin Denis (@0xmitsurugi) and Antide Petit (@xarkes_) from @Synacktiv
.