First published: Fri May 03 2024(Updated: )
NETGEAR RAX30 Telnet CLI passwd Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the telnet CLI service, which listens on TCP port 23. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20009.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear RAX30 | ||
All of | ||
NETGEAR RAX30 firmware | <1.0.10.94 | |
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40478 is classified as a high severity vulnerability allowing remote code execution under certain conditions.
To fix CVE-2023-40478, ensure your NETGEAR RAX30 router firmware is updated to the latest version.
CVE-2023-40478 affects users of the NETGEAR RAX30 routers running firmware versions up to and including 1.0.10.94.
No, CVE-2023-40478 requires authentication to exploit the buffer overflow vulnerability.
CVE-2023-40478 enables network-adjacent attackers to execute arbitrary code remotely on the affected routers.