A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
References
Link | Resource |
---|---|
https://kb.netgear.com/000066037/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-the-RAX30-PSV-2023-0160 | Vendor Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887 | Exploit Third Party Advisory |
https://kb.netgear.com/000066037/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-the-RAX30-PSV-2023-0160 | Vendor Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
11 Mar 2025, 16:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.netgear.com/000066037/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-the-RAX30-PSV-2023-0160 - Vendor Advisory | |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:o:netgear:rax30_firmware:1.0.7.78:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax30_firmware:1.0.11.96:*:*:*:*:*:*:* |
|
First Time |
Netgear rax30
Netgear rax30 Firmware Netgear |
|
CWE | CWE-787 |
Information
Published : 2024-03-07 15:15
Updated : 2025-03-11 16:56
NVD link : CVE-2023-48725
Mitre link : CVE-2023-48725
CVE.ORG link : CVE-2023-48725
JSON object : View
Products Affected
netgear
- rax30
- rax30_firmware