First published: Mon May 05 2025(Updated: )
NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_cancel_wps function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR RAX5 | ||
All of | ||
NETGEAR RAX50 | =1.0.2.26 | |
NETGEAR RAX50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57234 is classified as a high-severity command injection vulnerability.
To fix CVE-2024-57234, update the NETGEAR RAX5 router to the latest firmware version provided by NETGEAR.
CVE-2024-57234 affects the NETGEAR RAX5 WiFi Router running firmware version 1.0.2.26.
The impact of CVE-2024-57234 allows an attacker to execute arbitrary commands on the affected router.
There are no specific workarounds for CVE-2024-57234 other than applying the firmware update.