NETGEAR RAX30 USB Share Link Following Information Disclosure Vulnerability. This vulnerability allows physically present attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of symbolic links on removable USB media. By creating a symbolic link, an attacker can abuse the router's web server to access arbitrary local files. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-19498.
References
Configurations
Configuration 1 (hide)
AND |
|
History
03 Jan 2025, 17:03
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netgear rax30 Firmware
Netgear Netgear rax30 |
|
References | () https://kb.netgear.com/000065650/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2023-0003-PSV-2023-0004?article=000065650 - Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-837/ - Third Party Advisory | |
CPE | cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:* |
Information
Published : 2024-05-03 02:15
Updated : 2025-01-03 17:03
NVD link : CVE-2023-34283
Mitre link : CVE-2023-34283
CVE.ORG link : CVE-2023-34283
JSON object : View
Products Affected
netgear
- rax30
- rax30_firmware
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')