First published: Fri May 03 2024(Updated: )
NETGEAR RAX30 USB Share Link Following Information Disclosure Vulnerability. This vulnerability allows physically present attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of symbolic links on removable USB media. By creating a symbolic link, an attacker can abuse the router's web server to access arbitrary local files. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-19498.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear RAX30 | ||
All of | ||
NETGEAR RAX30 firmware | <1.0.10.94 | |
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34283 is classified as an information disclosure vulnerability with moderate severity.
To mitigate CVE-2023-34283, update the NETGEAR RAX30 router firmware to version 1.0.10.94 or later.
CVE-2023-34283 affects installations of NETGEAR RAX30 routers running vulnerable firmware versions.
No, CVE-2023-34283 requires physical access to exploit the information disclosure vulnerability.
Exploiting CVE-2023-34283 can lead to the disclosure of sensitive information stored on the affected NETGEAR RAX30 router.