First published: Mon May 05 2025(Updated: )
NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection vulnerability via the iface parameter in the vif_enable function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR RAX5 | ||
All of | ||
NETGEAR RAX50 | =1.0.2.26 | |
NETGEAR RAX50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57235 has been classified as a high severity command injection vulnerability, which could allow an attacker to execute arbitrary commands on the NETGEAR RAX5 router.
To mitigate CVE-2024-57235, update the firmware of the NETGEAR RAX5 router to the latest secure version provided by NETGEAR.
If exploited, CVE-2024-57235 could lead to unauthorized access and control over the NETGEAR RAX5 router, compromising network security.
CVE-2024-57235 affects the NETGEAR RAX5 router running firmware version 1.0.2.26.
As a temporary measure, users can limit access to the router's management interface and ensure that strong passwords and security settings are in place.