First published: Thu Mar 07 2024(Updated: )
A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR RAX30 | >=1.0.7.78<=1.0.11.96 | |
All of | ||
Any of | ||
NETGEAR RAX30 | =1.0.7.78 | |
NETGEAR RAX30 | =1.0.11.96 | |
NETGEAR RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48725 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2023-48725, update the Netgear RAX30 firmware to the latest version provided by the vendor.
CVE-2023-48725 affects Netgear RAX30 versions between 1.0.7.78 and 1.0.11.96.
Yes, CVE-2023-48725 can be exploited remotely through a specially crafted authenticated HTTP request.
Yes, an authenticated user must make the HTTP request to exploit CVE-2023-48725.