First published: Mon May 05 2025(Updated: )
NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_do_enr_pin_wps function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR RAX5 | ||
All of | ||
NETGEAR RAX50 | =1.0.2.26 | |
NETGEAR RAX50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57230 has been classified as a high severity command injection vulnerability.
To fix CVE-2024-57230, update your NETGEAR RAX5 router firmware to the latest version provided by NETGEAR.
CVE-2024-57230 affects the NETGEAR RAX5 (AX1600 WiFi Router) running firmware version 1.0.2.26.
CVE-2024-57230 is a command injection vulnerability that can be exploited via the ifname parameter in the apcli_do_enr_pin_wps function.
Yes, successful exploitation of CVE-2024-57230 can potentially allow attackers to execute arbitrary commands on the affected router.