This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6700v3 1.0.4.120_10.0.91 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the circled daemon. A crafted circleinfo.txt file can trigger an overflow of a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15879.
No PoCs from references.
- https://github.com/0xor0ne/awesome-list
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Jalexander798/JA_Tools-Cybersecurity-Resource-2
- https://github.com/attilaszia/linux-iot-cves
- https://github.com/bachkhoasoft/awesome-list-ks
- https://github.com/cyber-defence-campus/morion
- https://github.com/cyber-defence-campus/netgear_r6700v3_circled