NETGEAR RAX30 Use of Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the system configuration. The system contains a hardcoded user account which can be used to access the CLI service as a low-privileged user. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19660.
History

Fri, 03 Jan 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Netgear
Netgear rax30
Netgear rax30 Firmware
CPEs cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*
Vendors & Products Netgear
Netgear rax30
Netgear rax30 Firmware
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2024-05-03T01:57:11.707Z

Updated: 2024-08-02T16:10:05.610Z

Reserved: 2023-05-31T19:51:08.219Z

Link: CVE-2023-34284

cve-icon Vulnrichment

Updated: 2024-08-02T16:10:05.610Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-03T02:15:27.993

Modified: 2025-01-03T17:03:38.247

Link: CVE-2023-34284

cve-icon Redhat

No data.