Unknown
CVE-2022-27647
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)CVE-2022-27647
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the name or email field provided to libreadycloud.so. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15874.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- cax80 firmware,
- lax20 firmware,
- mr60 firmware,
- mr80 firmware,
- ms60 firmware,
- ms80 firmware,
- r6400 firmware,
- r6700 firmware,
- r6900p firmware,
- r7000 firmware,
- r7000p firmware,
- r7100lg firmware,
- r7850 firmware,
- r7900p firmware,
- r7960p firmware,
- r8000 firmware,
- r8000p firmware,
- r8500 firmware,
- rax15 firmware,
- rax20 firmware,
- rax200 firmware,
- rax35 firmware,
- rax38 firmware,
- rax40 firmware,
- rax42 firmware,
- rax43 firmware,
- rax45 firmware,
- rax48 firmware,
- rax50 firmware,
- rax50s firmware,
- rax75 firmware,
- rax80 firmware,
- rs400 firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: