8.8

CVE-2022-27643

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15692.

Data is provided by the National Vulnerability Database (NVD)
NetgearR6400 Firmware Version < 1.0.1.78
   NetgearR6400 Version-
NetgearR6400 Firmware Version < 1.0.4.126
   NetgearR6400 Versionv2
NetgearR6700 Firmware Version < 1.0.4.126
   NetgearR6700 Versionv3
NetgearR6900p Firmware Version < 1.3.3.148
   NetgearR6900p Version-
NetgearR7000 Firmware Version < 1.0.11.134
   NetgearR7000 Version-
NetgearR7000p Firmware Version < 1.3.3.148
   NetgearR7000p Version-
NetgearR7850 Firmware Version < 1.0.5.84
   NetgearR7850 Version-
NetgearR7900p Firmware Version < 1.4.3.88
   NetgearR7900p Version-
NetgearR7960p Firmware Version < 1.4.3.88
   NetgearR7960p Version-
NetgearR8000 Firmware Version < 1.0.4.84
   NetgearR8000 Version-
NetgearR8000p Firmware Version < 1.4.3.88
   NetgearR8000p Version-
NetgearR8500 Firmware Version < 1.0.2.158
   NetgearR8500 Version-
NetgearRax200 Firmware Version < 1.0.6.138
   NetgearRax200 Version-
NetgearRax75 Firmware Version < 1.0.6.138
   NetgearRax75 Version-
NetgearRax80 Firmware Version < 1.0.6.138
   NetgearRax80 Version-
NetgearRs400 Firmware Version < 1.5.1.86
   NetgearRs400 Version-
NetgearR7100lg Firmware Version < 1.0.0.76
   NetgearR7100lg Version-
NetgearWndr3400 Firmware Version < 1.0.1.44
   NetgearWndr3400 Versionv3
NetgearWnr3500l Firmware Version < 1.2.0.72
   NetgearWnr3500l Versionv2
NetgearXr300 Firmware Version < 1.0.3.72
   NetgearXr300 Version-
NetgearDc112a Firmware Version < 1.0.0.64
   NetgearDc112a Version-
NetgearD6220 Firmware Version < 1.0.0.80
   NetgearD6220 Version-
NetgearD6400 Firmware Version < 1.0.0.114
   NetgearD6400 Version-
NetgearEx3700 Firmware Version < 1.0.0.96
   NetgearEx3700 Version-
NetgearEx3800 Firmware Version < 1.0.0.96
   NetgearEx3800 Version-
NetgearEx6120 Firmware Version < 1.0.0.68
   NetgearEx6120 Version-
NetgearEx6130 Firmware Version < 1.0.0.48
   NetgearEx6130 Version-
NetgearD7000v2 Firmware Version < 1.0.0.80
   NetgearD7000v2 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 4.65% 0.889
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
zdi-disclosures@trendmicro.com 8.8 2.8 5.9
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.