NETGEAR ProSAFE Network Management System getNodesByTopologyMapSearch SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability. The specific flaw exists within the getNodesByTopologyMapSearch function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-21858.
History

Thu, 19 Sep 2024 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Netgear
Netgear prosafe Network Management System
CPEs cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:*
Vendors & Products Netgear
Netgear prosafe Network Management System
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2024-05-03T02:14:11.766Z

Updated: 2024-09-18T18:30:34.058Z

Reserved: 2023-09-28T18:02:49.776Z

Link: CVE-2023-44450

cve-icon Vulnrichment

Updated: 2024-08-02T20:07:33.369Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-03T03:16:01.453

Modified: 2024-11-21T08:25:55.523

Link: CVE-2023-44450

cve-icon Redhat

No data.