First published: Mon Jun 10 2024(Updated: )
This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the downloading of files via HTTPS. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-19589 is significant as it allows network-adjacent attackers to compromise the integrity of downloaded files without authentication.
To fix ZDI-CAN-19589, ensure that your NETGEAR RAX30 router firmware is updated to the latest version provided by NETGEAR.
NETGEAR RAX30 router users are affected by ZDI-CAN-19589.
ZDI-CAN-19589 can only be exploited locally by network-adjacent attackers.
ZDI-CAN-19589 can enable attackers to manipulate the integrity of files downloaded from affected routers.