Описание
A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-48725
- https://kb.netgear.com/000066037/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-the-RAX30-PSV-2023-0160
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1887
Связанные уязвимости
A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Уязвимость функции getblockschedule() синтаксического анализа JSON микропрограммного обеспечения маршрутизаторов NETGEAR RAX28, RAX29, RAX30, позволяющая нарушителю выполнить произвольный код