8.8

CVE-2022-27641

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15806.

Data is provided by the National Vulnerability Database (NVD)
NetgearD7800 Firmware Version < 1.0.1.68
   NetgearD7800 Version-
NetgearEx6200 Firmware Version < 1.0.1.90
   NetgearEx6200 Versionv2
NetgearEx8000 Firmware Version < 1.0.1.240
   NetgearEx8000 Version-
NetgearR6220 Firmware Version < 1.1.0.112
   NetgearR6220 Version-
NetgearR6230 Firmware Version < 1.1.0.112
   NetgearR6230 Version-
NetgearR6400 Firmware Version < 1.0.4.122
   NetgearR6400 Versionv2
NetgearR6700 Firmware Version < 1.0.4.122
   NetgearR6700 Versionv3
NetgearR7000 Firmware Version < 1.0.11.130
   NetgearR7000 Version-
NetgearR7800 Firmware Version < 1.0.2.90
   NetgearR7800 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.14% 0.306
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
zdi-disclosures@trendmicro.com 8.8 2.8 5.9
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-190 Integer Overflow or Wraparound

The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.