First published: Wed Mar 29 2023(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the name or email field provided to libreadycloud.so. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15874.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR R6700v3 firmware | ||
NETGEAR CAX80 | <2.1.3.7 | |
NETGEAR CAX80 Firmware | ||
NETGEAR LAX20 firmware | <1.1.6.34 | |
NETGEAR LAX20 | ||
NETGEAR MR60 Firmware | <1.1.6.124 | |
NETGEAR MR60 firmware | ||
NETGEAR MR80 | <1.1.6.14 | |
NETGEAR Multiple Routers | ||
NETGEAR MS60 | <1.1.6.124 | |
NETGEAR MS60 firmware | ||
NETGEAR MS80 | <1.1.6.14 | |
NETGEAR MS80 | ||
NETGEAR R6400 firmware | <1.0.1.78 | |
NETGEAR R6400 firmware | ||
NETGEAR R6400 firmware | <1.0.4.126 | |
NETGEAR R6400 firmware | =v2 | |
NETGEAR R6700 firmware | <1.0.4.126 | |
NETGEAR R6700v1 firmware | =v3 | |
NETGEAR R6900P firmware | <1.3.3.148 | |
Netgear R6900 Firmware | ||
Netgear Nighthawk R7000 Firmware | <1.0.11.134 | |
NETGEAR Nighthawk R7000 | ||
NETGEAR R7000P firmware | <1.3.3.148 | |
Netgear Routers | ||
NETGEAR R7850 | <1.0.5.84 | |
NETGEAR R7850 firmware | ||
NETGEAR R7900P firmware | <1.4.3.88 | |
NETGEAR R7900P firmware | ||
NETGEAR R7960P firmware | <1.4.3.88 | |
NETGEAR R7960P firmware | ||
NETGEAR R8000 firmware | <1.0.4.84 | |
NETGEAR R8000 firmware | ||
NETGEAR R8000P | <1.4.3.88 | |
NETGEAR R8000P firmware | ||
NETGEAR R8500 | <1.0.2.158 | |
NETGEAR R8500 | ||
NETGEAR RAX15 firmware | <1.0.10.110 | |
NETGEAR RAX15 firmware | ||
NETGEAR RAX20 firmware | <1.0.10.110 | |
NETGEAR RAX20 firmware | ||
NETGEAR RAX200 firmware | <1.0.6.138 | |
NETGEAR RAX200 firmware | ||
NETGEAR RAX35 firmware | <1.0.10.110 | |
Netgear RAX35 | =v2 | |
NETGEAR RAX38v2 Firmware | <1.0.10.110 | |
NETGEAR RAX38v2 Firmware | =v2 | |
NETGEAR RAX40 firmware | <1.0.10.110 | |
NETGEAR RAX40 firmware | =v2 | |
NETGEAR RAX42 | <1.0.10.110 | |
NETGEAR RAX42 Firmware | ||
Netgear RAX43 | <1.0.10.110 | |
Netgear RAX43 | ||
NETGEAR RAX45 firmware | <1.0.10.110 | |
NETGEAR RAX45 firmware | ||
NETGEAR RAX48 | <1.0.10.110 | |
NETGEAR RAX48 Firmware | ||
NETGEAR RAX50 | <1.0.10.110 | |
NETGEAR RAX50 | ||
NETGEAR RAX50 | <1.0.10.110 | |
NETGEAR RAX50 | ||
NETGEAR RAX75 firmware | <1.0.6.138 | |
NETGEAR RAX75 firmware | ||
NETGEAR RAX80 Firmware | <1.0.6.138 | |
NETGEAR RAX80 firmware | ||
NETGEAR RS400 firmware | <1.5.1.86 | |
NETGEAR RS400 firmware | ||
NETGEAR R7100LG firmware | <1.0.0.76 | |
Netgear R7100LG |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27647 has a high severity rating due to its potential to allow arbitrary code execution on affected NETGEAR routers.
To fix CVE-2022-27647, update your NETGEAR R6700v3 router firmware to the latest version provided by NETGEAR.
CVE-2022-27647 affects installations of NETGEAR R6700v3 routers running vulnerable firmware versions.
Yes, authentication is required to exploit CVE-2022-27647, but the existing mechanism can be bypassed.
The primary product impacted by CVE-2022-27647 is the NETGEAR R6700v3 router, among other NETGEAR routers listed in the vulnerability details.