Количество 3
Количество 3
CVE-2022-27643
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15692.
GHSA-h8wj-xxvx-cv2r
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15692.
BDU:2022-01712
Уязвимость встроенного программного обеспечения маршрутизаторов NETGEAR R6400, NETGEAR R6400v2, NETGEAR R6700v3, NETGEAR R6900P, NETGEAR R7000, NETGEAR R7000P, NETGEAR R8500, NETGEAR RS400, NETGEAR WNDR3400v3, NETGEAR WNR3500Lv2, NETGEAR XR300, NETGEAR D6220, NETGEAR D6400, NETGEAR D7000v2, NETGEAR R7100LG, NETGEAR DC112A, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-27643 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15692. | CVSS3: 8.8 | 6% Низкий | почти 3 года назад | |
GHSA-h8wj-xxvx-cv2r This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15692. | CVSS3: 8.8 | 6% Низкий | почти 3 года назад | |
BDU:2022-01712 Уязвимость встроенного программного обеспечения маршрутизаторов NETGEAR R6400, NETGEAR R6400v2, NETGEAR R6700v3, NETGEAR R6900P, NETGEAR R7000, NETGEAR R7000P, NETGEAR R8500, NETGEAR RS400, NETGEAR WNDR3400v3, NETGEAR WNR3500Lv2, NETGEAR XR300, NETGEAR D6220, NETGEAR D6400, NETGEAR D7000v2, NETGEAR R7100LG, NETGEAR DC112A, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.8 | 6% Низкий | около 4 лет назад |
Уязвимостей на страницу