Unknown
CVE-2022-27642
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)CVE-2022-27642
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-15854.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- cax80 firmware,
- lax20 firmware,
- mr60 firmware,
- mr80 firmware,
- ms60 firmware,
- ms80 firmware,
- r6400 firmware,
- r6700 firmware,
- r6900p firmware,
- r7000 firmware,
- r7000p firmware,
- r7100lg firmware,
- r7850 firmware,
- r7900p firmware,
- r7960p firmware,
- r8000 firmware,
- r8000p firmware,
- r8500 firmware,
- rax15 firmware,
- rax20 firmware,
- rax200 firmware,
- rax35 firmware,
- rax38 firmware,
- rax40 firmware,
- rax42 firmware,
- rax43 firmware,
- rax45 firmware,
- rax48 firmware,
- rax50 firmware,
- rax50s firmware,
- rax75 firmware,
- rax80 firmware,
- rs400 firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: