First published: Wed Dec 20 2023(Updated: )
This vulnerability allows remote attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. Minimal user interaction is required to exploit this vulnerability. The specific flaw exists within the saveNodeLabel method. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear ProSAFE Network Management Software 300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-21838 has a critical severity level due to its potential for remote privilege escalation.
To fix ZDI-CAN-21838, update the NETGEAR ProSAFE Network Management System to the latest version.
Users of NETGEAR ProSAFE Network Management System are affected by ZDI-CAN-21838.
ZDI-CAN-21838 can facilitate remote attacks that lead to privilege escalation on vulnerable installations.
Minimal user interaction is required to exploit ZDI-CAN-21838, making it particularly dangerous.