NETGEAR RAX30 rex_cgi JSON Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of JSON data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19355.
History

Fri, 03 Jan 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Netgear rax30
Weaknesses CWE-787
CPEs cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*
Vendors & Products Netgear rax30
Metrics cvssV3_1

{'score': 8.0, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2024-08-02T12:09:43.400Z

Reserved: 2023-02-28T17:58:45.484Z

Link: CVE-2023-27361

cve-icon Vulnrichment

Updated: 2024-07-23T20:06:05.247Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-03T02:15:14.187

Modified: 2025-01-03T17:33:32.360

Link: CVE-2023-27361

cve-icon Redhat

No data.