A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Tue, 11 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netgear
Netgear rax30 Netgear rax30 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax30_firmware:1.0.11.96:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax30_firmware:1.0.7.78:*:*:*:*:*:*:* |
|
| Vendors & Products |
Netgear
Netgear rax30 Netgear rax30 Firmware |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-11-04T18:19:17.154Z
Reserved: 2023-12-01T22:00:57.981Z
Link: CVE-2023-48725
Updated: 2025-11-04T18:19:17.154Z
Status : Modified
Published: 2024-03-07T15:15:07.733
Modified: 2025-11-04T19:16:07.370
Link: CVE-2023-48725
No data.
OpenCVE Enrichment
No data.