First published: Mon May 01 2023(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Authentication is required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-23-495 is considered high due to its potential for arbitrary code execution.
To fix ZDI-23-495, update your NETGEAR RAX30 router to the latest firmware version provided by NETGEAR.
ZDI-23-495 affects installations of the NETGEAR RAX30 router that are accessible to network-adjacent attackers.
ZDI-23-495 involves a post-authentication buffer overflow vulnerability that can allow code execution.
Yes, authentication is required to exploit the ZDI-23-495 vulnerability.