First published: Wed Mar 29 2023(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15806.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R6700v3 firmware | ||
NETGEAR D7800 | <1.0.1.68 | |
NETGEAR D7800 Firmware | ||
NETGEAR EX6200 firmware | <1.0.1.90 | |
NETGEAR EX6200 | =v2 | |
NETGEAR EX8000 | <1.0.1.240 | |
NETGEAR EX8000 | ||
NETGEAR R6220 firmware | <1.1.0.112 | |
NETGEAR R6220 firmware | ||
NETGEAR R6230 firmware | <1.1.0.112 | |
NETGEAR R6230 firmware | ||
NETGEAR R6400 firmware | <1.0.4.122 | |
NETGEAR R6400 firmware | =v2 | |
Netgear R6700 Firmware | <1.0.4.122 | |
NETGEAR R6700v1 firmware | =v3 | |
NETGEAR R7000 firmware | <1.0.11.130 | |
NETGEAR R7000 firmware | ||
NETGEAR R7800 firmware | <1.0.2.90 | |
NETGEAR R7800 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27641 is a vulnerability that allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 routers.
CVE-2022-27641 has a severity rating of 8.8 out of 10, indicating a high severity.
An attacker can exploit CVE-2022-27641 without authentication by sending malicious packets to the vulnerable router's NetUSB module.
No, authentication is not required to exploit CVE-2022-27641.
Yes, updating the firmware of the NETGEAR R6700v3 router to a patched version will mitigate the vulnerability.