First published: Fri May 03 2024(Updated: )
NETGEAR RAX30 lighttpd Misconfiguration Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the lighttpd HTTP server. The issue results from allowing execution of files from untrusted sources. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19398.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear RAX30 | ||
All of | ||
NETGEAR RAX30 firmware | <1.0.10.94 | |
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27360 is a critical severity vulnerability that allows remote code execution without authentication.
To fix CVE-2023-27360, update the NETGEAR RAX30 firmware to the latest version released by NETGEAR.
CVE-2023-27360 affects users of the NETGEAR RAX30 with firmware versions prior to 1.0.10.94.
Yes, CVE-2023-27360 can be exploited by network-adjacent attackers without the need for authentication.
Exploitation of CVE-2023-27360 could allow attackers to execute arbitrary code on the affected NETGEAR RAX30 installations.