A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 11 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netgear
Netgear rax30 Netgear rax30 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax30_firmware:1.0.11.96:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax30_firmware:1.0.7.78:*:*:*:*:*:*:* |
|
| Vendors & Products |
Netgear
Netgear rax30 Netgear rax30 Firmware |
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-05T15:56:49.293Z
Reserved: 2023-12-01T22:00:57.981Z
Link: CVE-2023-48725
Updated: 2024-08-02T21:37:54.638Z
Status : Analyzed
Published: 2024-03-07T15:15:07.733
Modified: 2025-03-11T16:56:47.143
Link: CVE-2023-48725
No data.
OpenCVE Enrichment
No data.