First published: Wed Mar 29 2023(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15806.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear D7800 Firmware | <1.0.1.68 | |
Netgear D7800 | ||
Netgear Ex6200 Firmware | <1.0.1.90 | |
Netgear EX6200 | =v2 | |
NETGEAR R7800 | <1.0.1.240 | |
Netgear Ex8000 | ||
Netgear R6220 Firmware | <1.1.0.112 | |
NETGEAR R6220 | ||
Netgear R6230 Firmware | <1.1.0.112 | |
Netgear R6230 | ||
Netgear R6400 Firmware | <1.0.4.122 | |
NETGEAR R6400 | =v2 | |
Netgear R6700 Firmware | <1.0.4.122 | |
NETGEAR R6700 | =v3 | |
Netgear R7000 Firmware | <1.0.11.130 | |
NETGEAR R7000 | ||
NETGEAR R7800 firmware | <1.0.2.90 | |
NETGEAR R7800 | ||
NETGEAR R6700v3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27641 is a vulnerability that allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 routers.
CVE-2022-27641 has a severity rating of 8.8 out of 10, indicating a high severity.
An attacker can exploit CVE-2022-27641 without authentication by sending malicious packets to the vulnerable router's NetUSB module.
No, authentication is not required to exploit CVE-2022-27641.
Yes, updating the firmware of the NETGEAR R6700v3 router to a patched version will mitigate the vulnerability.