Product:

R6700_firmware

(Netgear)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 173
Date Id Summary Products Score Patch Annotated
2021-12-30 CVE-2021-23147 Netgear Nighthawk R6700 version 1.0.4.120 does not have sufficient protections for the UART console. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection and execute commands as the root user without authentication. R6700_firmware 6.8
2021-12-30 CVE-2021-45077 Netgear Nighthawk R6700 version 1.0.4.120 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device. R6700_firmware 7.5
2021-12-30 CVE-2021-45732 Netgear Nighthawk R6700 version 1.0.4.120 makes use of a hardcoded credential. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted/obfuscated. By extracting the configuration using readily available public tools, a user can reconfigure settings not intended to be manipulated, repackage the configuration, and restore a backup causing these settings to be changed. R6700_firmware 8.8
2023-03-29 CVE-2022-27641 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was... D7800_firmware, Ex6200_firmware, Ex8000_firmware, R6220_firmware, R6230_firmware, R6400_firmware, R6700_firmware, R7000_firmware, R7800_firmware 8.8
2023-03-29 CVE-2022-27642 This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-15854. Cax80_firmware, Lax20_firmware, Mr60_firmware, Mr80_firmware, Ms60_firmware, Ms80_firmware, R6400_firmware, R6700_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7100lg_firmware, R7850_firmware, R7900p_firmware, R7960p_firmware, R8000_firmware, R8000p_firmware, R8500_firmware, Rax15_firmware, Rax200_firmware, Rax20_firmware, Rax35_firmware, Rax38_firmware, Rax40_firmware, Rax42_firmware, Rax43_firmware, Rax45_firmware, Rax48_firmware, Rax50_firmware, Rax50s_firmware, Rax75_firmware, Rax80_firmware, Rs400_firmware 8.8
2023-03-29 CVE-2022-27643 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SOAP requests. When parsing the SOAPAction header, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of... D6220_firmware, D6400_firmware, D7000v2_firmware, Dc112a_firmware, Ex3700_firmware, Ex3800_firmware, Ex6120_firmware, Ex6130_firmware, R6400_firmware, R6700_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7100lg_firmware, R7850_firmware, R7900p_firmware, R7960p_firmware, R8000_firmware, R8000p_firmware, R8500_firmware, Rax200_firmware, Rax75_firmware, Rax80_firmware, Rs400_firmware, Wndr3400_firmware, Wnr3500l_firmware, Xr300_firmware 8.8
2023-03-29 CVE-2022-27644 This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute... Cbr40_firmware, Lbr1020_firmware, Lbr20_firmware, R6400_firmware, R6700_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7850_firmware, R7960p_firmware, R8000_firmware, R8000p_firmware, Rax200_firmware, Rax75_firmware, Rax80_firmware, Rbr10_firmware, Rbr20_firmware, Rbr40_firmware, Rbr50_firmware, Rbs10_firmware, Rbs20_firmware, Rbs40_firmware, Rbs50_firmware, Rs400_firmware 8.8
2023-03-29 CVE-2022-27645 This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R6700v3 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within readycloud_control.cgi. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15762. Lax20_firmware, R6400_firmware, R6700_firmware, R7000_firmware, R7850_firmware, R7900p_firmware, R7960p_firmware, R8000_firmware, R8000p_firmware, R8500_firmware, Rax15_firmware, Rax200_firmware, Rax20_firmware, Rax35_firmware, Rax38_firmware, Rax40_firmware, Rax42_firmware, Rax43_firmware, Rax45_firmware, Rax48_firmware, Rax50_firmware, Rax50s_firmware, Rax75_firmware 8.8
2023-03-29 CVE-2022-27647 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the name or email field provided to libreadycloud.so. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call.... Cax80_firmware, Lax20_firmware, Mr60_firmware, Mr80_firmware, Ms60_firmware, Ms80_firmware, R6400_firmware, R6700_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7100lg_firmware, R7850_firmware, R7900p_firmware, R7960p_firmware, R8000_firmware, R8000p_firmware, R8500_firmware, Rax15_firmware, Rax200_firmware, Rax20_firmware, Rax35_firmware, Rax38_firmware, Rax40_firmware, Rax42_firmware, Rax43_firmware, Rax45_firmware, Rax48_firmware, Rax50_firmware, Rax50s_firmware, Rax75_firmware, Rax80_firmware, Rs400_firmware 8.0
2023-03-29 CVE-2022-27646 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the circled daemon. A crafted circleinfo.txt file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of... Cbr40_firmware, Lbr1020_firmware, Lbr20_firmware, R6400_firmware, R6700_firmware, R6900p_firmware, R7000_firmware, R7000p_firmware, R7850_firmware, R7960p_firmware, R8000_firmware, R8000p_firmware, Rax200_firmware, Rax75_firmware, Rax80_firmware, Rbr10_firmware, Rbr20_firmware, Rbr40_firmware, Rbr50_firmware, Rbs10_firmware, Rbs20_firmware, Rbs40_firmware, Rbs50_firmware, Rs400_firmware 8.8