First published: Tue Jun 11 2019(Updated: )
In NETGEAR ReadyNAS Surveillance before 1.4.3-17 x86 and before 1.1.4-7 ARM, $_GET['uploaddir'] is not escaped and is passed to system() through $tmp_upload_dir, leading to upgrade_handle.php?cmd=writeuploaddir remote command execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR ReadyNAS Surveillance | <1.1.4-7 | |
NETGEAR ReadyNAS Surveillance | <1.4.3-17 | |
Netgear Readynas Surveillance Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18378 is classified as a critical vulnerability due to its potential for remote command execution.
To fix CVE-2017-18378, upgrade to NETGEAR ReadyNAS Surveillance versions 1.4.3-17 for x86 or 1.1.4-7 for ARM, which contain the necessary security patches.
CVE-2017-18378 affects NETGEAR ReadyNAS Surveillance firmware versions prior to 1.4.3-17 for x86 and prior to 1.1.4-7 for ARM.
CVE-2017-18378 is a command injection vulnerability that allows an attacker to execute arbitrary commands on the affected system.
CVE-2017-18378 can be exploited by manipulating the $_GET['uploaddir'] parameter to execute system commands via the upgrade_handle.php script.