First published: Fri May 03 2024(Updated: )
NETGEAR RAX30 UPnP Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19704.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR RAX30 | ||
All of | ||
NETGEAR RAX30 | <1.0.9.92 | |
NETGEAR RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40479 is considered a critical severity vulnerability due to the potential for remote code execution.
To fix CVE-2023-40479, ensure your NETGEAR RAX30 router firmware is updated to the latest version that addresses this vulnerability.
CVE-2023-40479 affects installations of NETGEAR RAX30 routers running firmware versions prior to 1.0.9.92.
Yes, CVE-2023-40479 allows network-adjacent attackers to exploit the vulnerability without prior authentication.
CVE-2023-40479 involves a UPnP command injection attack that can lead to arbitrary code execution on the affected devices.