CVE-2022-27646
HIGHNetgear R6400 Firmware < 1.0.4.126 - Stack Buffer Overflow
Title source: ruleDescription
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the circled daemon. A crafted circleinfo.txt file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15879.
Exploits (1)
nomisec
WORKING POC
8 stars
by cyber-defence-campus · poc
https://github.com/cyber-defence-campus/netgear_r6700v3_circled
References (2)
Core 2
Core References
Vendor Advisory
https://kb.netgear.com/000064721/Security-Advisory-for-Multiple-Vulnerabilities-on-Multiple-Products-PSV-2021-0324
Third Party Advisory, VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-22-523/
Scores
CVSS v3
8.8
EPSS
0.0241
EPSS Percentile
85.2%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-121
Status
published
Products (24)
netgear/cbr40_firmware
< 2.5.0.28
netgear/lbr1020_firmware
< 2.7.4.2
netgear/lbr20_firmware
< 2.7.4.2
netgear/r6400_firmware
< 1.0.4.126
netgear/r6700_firmware
< 1.0.4.126
netgear/r6900p_firmware
< 1.3.3.148
netgear/r7000_firmware
< 1.0.11.134
netgear/r7000p_firmware
< 1.3.3.148
netgear/r7850_firmware
< 1.0.5.84
netgear/r7960p_firmware
< 1.4.3.88
... and 14 more
Published
Mar 29, 2023
Tracked Since
Feb 18, 2026