First published: Tue Jun 11 2019(Updated: )
In NETGEAR ReadyNAS Surveillance before 1.4.3-17 x86 and before 1.1.4-7 ARM, $_GET['uploaddir'] is not escaped and is passed to system() through $tmp_upload_dir, leading to upgrade_handle.php?cmd=writeuploaddir remote command execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Readynas Surveillance Firmware | <1.1.4-7 | |
Netgear Readynas Surveillance Firmware | <1.4.3-17 | |
NETGEAR ReadyNAS Surveillance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.