This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the circled daemon. A crafted circleinfo.txt file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15879.
History

Tue, 18 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2025-02-18T17:47:05.390Z

Reserved: 2022-03-22T00:00:00.000Z

Link: CVE-2022-27646

cve-icon Vulnrichment

Updated: 2024-08-03T05:32:59.786Z

cve-icon NVD

Status : Modified

Published: 2023-03-29T19:15:08.707

Modified: 2024-11-21T06:56:05.500

Link: CVE-2022-27646

cve-icon Redhat

No data.