First published: Fri Dec 16 2022(Updated: )
The default console presented to users over telnet (when enabled) is restricted to a subset of commands. Commands issued at this console, however, appear to be fed directly into a system call or other similar function. This allows any authenticated user to execute arbitrary commands on the device.
Credit: vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Rax30 Firmware | <1.0.9.90 | |
Netgear RAX30 | ||
All of | ||
Netgear Rax30 Firmware | <1.0.9.90 | |
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-47210 is a vulnerability that allows any authenticated user to execute arbitrary commands on the affected Netgear Rax30 Firmware device.
CVE-2022-47210 affects the Netgear Rax30 Firmware version 1.0.9.90 by allowing authenticated users to execute arbitrary commands on the device.
CVE-2022-47210 has a severity rating of 7.8 out of 10, which is considered high.
To fix CVE-2022-47210, it is recommended to apply the latest firmware update provided by the vendor, Netgear.
You can find more information about CVE-2022-47210 in the Tenable Advisory [TRA-2022-37](https://www.tenable.com/security/research/tra-2022-37).