This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the circled daemon. A crafted circleinfo.txt file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15879.
References
Link | Resource |
---|---|
https://kb.netgear.com/000064721/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0324 | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-523/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
Configuration 20 (hide)
AND |
|
Configuration 21 (hide)
AND |
|
Configuration 22 (hide)
AND |
|
Configuration 23 (hide)
AND |
|
Configuration 24 (hide)
AND |
|
History
06 Apr 2023, 17:43
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-523/ - Third Party Advisory, VDB Entry | |
References | (MISC) https://kb.netgear.com/000064721/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0324 - Vendor Advisory | |
CPE | cpe:2.3:o:netgear:rbr10_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7850_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:rs400:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7960p_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rbs10_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rs400_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:lbr1020_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:lbr20:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r8000p:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:lbr20_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7850:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6700:v3:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7960p:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:lbr1020:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rbs10:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:* cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:rbr10:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:r8000p_firmware:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Netgear rs400 Firmware
Netgear r6700 Firmware Netgear rbr10 Firmware Netgear rax80 Netgear rbs40 Netgear rax200 Firmware Netgear r7000p Firmware Netgear lbr20 Firmware Netgear rbr50 Netgear r7000 Netgear r7000p Netgear r6900p Firmware Netgear lbr20 Netgear rax200 Netgear r8000p Firmware Netgear rbs10 Firmware Netgear rbs50 Firmware Netgear rbr40 Firmware Netgear r6900p Netgear r6400 Firmware Netgear cbr40 Firmware Netgear r7960p Firmware Netgear Netgear rbr20 Firmware Netgear rbs20 Firmware Netgear rbr20 Netgear r8000 Firmware Netgear lbr1020 Netgear rbs20 Netgear rax80 Firmware Netgear rbr10 Netgear rbs50 Netgear r6400 Netgear r8000 Netgear rs400 Netgear r7850 Firmware Netgear r8000p Netgear r7000 Firmware Netgear r7850 Netgear lbr1020 Firmware Netgear cbr40 Netgear rax75 Netgear r7960p Netgear rax75 Firmware Netgear rbs40 Firmware Netgear rbr40 Netgear r6700 Netgear rbs10 Netgear rbr50 Firmware |
Information
Published : 2023-03-29 19:15
Updated : 2023-04-06 17:43
NVD link : CVE-2022-27646
Mitre link : CVE-2022-27646
JSON object : View
Products Affected
netgear
- rax200_firmware
- cbr40
- rbs40_firmware
- rs400_firmware
- rbs20_firmware
- r7960p
- rax80_firmware
- rbs50
- rbr10_firmware
- rbr10
- r7850_firmware
- rbr20
- lbr20
- rax75_firmware
- cbr40_firmware
- rbs20
- rs400
- lbr1020_firmware
- r6400
- r7000_firmware
- r6400_firmware
- r8000_firmware
- r8000p_firmware
- r6700_firmware
- r7000p
- r7850
- r8000p
- rbr20_firmware
- rbr50
- r7960p_firmware
- r8000
- rax80
- rbs50_firmware
- rax200
- rbs10
- r6700
- rbr50_firmware
- lbr20_firmware
- r7000p_firmware
- r6900p
- rbs10_firmware
- r6900p_firmware
- rbs40
- rbr40
- r7000
- lbr1020
- rax75
- rbr40_firmware
CWE
CWE-121
Stack-based Buffer Overflow