First published: Mon May 01 2023(Updated: )
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-23-501 is classified as high due to the potential for unauthorized access and sensitive information disclosure.
To fix ZDI-23-501, update your NETGEAR RAX30 router to the latest firmware version provided by NETGEAR.
ZDI-23-501 affects installations of NETGEAR RAX30 routers that have not been updated with the necessary security patches.
ZDI-23-501 allows network-adjacent attackers to bypass authentication and disclose sensitive information.
Yes, authentication is required, but the vulnerability allows the existing mechanism to be bypassed.