First published: Wed Mar 15 2023(Updated: )
When uploading a firmware image to a Netgear Nighthawk Wifi6 Router (RAX30), a hidden “forceFWUpdate” parameter may be provided to force the upgrade to complete and bypass certain validation checks. End users can use this to upload modified, unofficial, and potentially malicious firmware to the device.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Rax30 Firmware | ||
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28337 is a vulnerability that allows the upload of modified or potentially malicious firmware to a Netgear Nighthawk Wifi6 Router (RAX30) by bypassing certain validation checks.
CVE-2023-28337 affects Netgear RAX30 firmware by allowing the upload of unofficial firmware that could be modified or malicious.
CVE-2023-28337 has a severity rating of 8.8 (High).
To fix CVE-2023-28337, Netgear should release a firmware update that addresses the vulnerability and prevents the bypassing of validation checks.
More information about CVE-2023-28337 can be found at the following link: https://drupal9.tenable.com/security/research/tra-2023-12