First published: Mon May 01 2023(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear RAX30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-19825 is rated as a high severity vulnerability due to its potential for remote code execution.
To fix ZDI-CAN-19825, ensure your NETGEAR RAX30 router firmware is updated to the latest version provided by NETGEAR.
ZDI-CAN-19825 affects users of NETGEAR RAX30 routers, particularly those with outdated firmware.
ZDI-CAN-19825 allows network-adjacent attackers to execute arbitrary code on affected NETGEAR RAX30 routers.
No, while ZDI-CAN-19825 requires authentication, the existing authentication mechanism can be bypassed.