Логотип exploitDog
bind:CVE-2023-27356
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-27356

Количество 3

Количество 3

nvd логотип

CVE-2023-27356

почти 2 года назад

NETGEAR RAX30 logCtrl Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the logCtrl action. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19825.

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-6m45-v2q8-6746

почти 2 года назад

NETGEAR RAX30 logCtrl Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the logCtrl action. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19825.

CVSS3: 6.8
EPSS: Низкий
fstec логотип

BDU:2023-02577

около 3 лет назад

Уязвимость микропрограммного обеспечения маршрутизаторов NETGEAR RAX30 и NETGEAR RAXE300 , существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю выполнить произвольный код в контексте root

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-27356

NETGEAR RAX30 logCtrl Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the logCtrl action. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19825.

CVSS3: 8
0%
Низкий
почти 2 года назад
github логотип
GHSA-6m45-v2q8-6746

NETGEAR RAX30 logCtrl Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the logCtrl action. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19825.

CVSS3: 6.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-02577

Уязвимость микропрограммного обеспечения маршрутизаторов NETGEAR RAX30 и NETGEAR RAXE300 , существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю выполнить произвольный код в контексте root

CVSS3: 6.7
0%
Низкий
около 3 лет назад

Уязвимостей на страницу