Количество 3
Количество 3
CVE-2025-44658
In Netgear RAX30 V1.0.10.94, a PHP-FPM misconfiguration vulnerability is caused by not following the specification to only limit FPM to .php extensions. An attacker may exploit this by uploading malicious scripts disguised with alternate extensions and tricking the web server into executing them as PHP, bypassing security mechanisms based on file extension filtering. This may lead to remote code execution (RCE), information disclosure, or full system compromise.
GHSA-m92m-qpp4-8jc8
In Netgear RAX30 V1.0.10.94, a PHP-FPM misconfiguration vulnerability is caused by not following the specification to only limit FPM to .php extensions. An attacker may exploit this by uploading malicious scripts disguised with alternate extensions and tricking the web server into executing them as PHP, bypassing security mechanisms based on file extension filtering. This may lead to remote code execution (RCE), information disclosure, or full system compromise.
BDU:2025-09549
Уязвимость обработчика PHP-FPM (FastCGI Process Manager) микропрограммного обеспечения маршрутизаторов Nighthawk WiFi 6 Router (RAX30, позволяющая нарушителю обойти ограничения безопасности, выполнить произвольный код и получить полный контроль над системой
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-44658 In Netgear RAX30 V1.0.10.94, a PHP-FPM misconfiguration vulnerability is caused by not following the specification to only limit FPM to .php extensions. An attacker may exploit this by uploading malicious scripts disguised with alternate extensions and tricking the web server into executing them as PHP, bypassing security mechanisms based on file extension filtering. This may lead to remote code execution (RCE), information disclosure, or full system compromise. | CVSS3: 9.8 | 0% Низкий | 7 месяцев назад | |
GHSA-m92m-qpp4-8jc8 In Netgear RAX30 V1.0.10.94, a PHP-FPM misconfiguration vulnerability is caused by not following the specification to only limit FPM to .php extensions. An attacker may exploit this by uploading malicious scripts disguised with alternate extensions and tricking the web server into executing them as PHP, bypassing security mechanisms based on file extension filtering. This may lead to remote code execution (RCE), information disclosure, or full system compromise. | CVSS3: 9.8 | 0% Низкий | 7 месяцев назад | |
BDU:2025-09549 Уязвимость обработчика PHP-FPM (FastCGI Process Manager) микропрограммного обеспечения маршрутизаторов Nighthawk WiFi 6 Router (RAX30, позволяющая нарушителю обойти ограничения безопасности, выполнить произвольный код и получить полный контроль над системой | CVSS3: 9.8 | 0% Низкий | 7 месяцев назад |
Уязвимостей на страницу