Vulnerability Description
When uploading a firmware image to a Netgear Nighthawk Wifi6 Router (RAX30), a hidden “forceFWUpdate” parameter may be provided to force the upgrade to complete and bypass certain validation checks. End users can use this to upload modified, unofficial, and potentially malicious firmware to the device.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Rax30 Firmware | All versions |
| Netgear | Rax30 | - |
Related Weaknesses (CWE)
References
- https://drupal9.tenable.com/security/research/tra-2023-12Permissions Required
- https://drupal9.tenable.com/security/research/tra-2023-12Permissions Required
FAQ
What is CVE-2023-28337?
CVE-2023-28337 is a vulnerability with a CVSS score of 8.8 (HIGH). When uploading a firmware image to a Netgear Nighthawk Wifi6 Router (RAX30), a hidden “forceFWUpdate” parameter may be provided to force the upgrade to complete and bypass certain validation checks. E...
How severe is CVE-2023-28337?
CVE-2023-28337 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-28337?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Rax30 Firmware, Netgear Rax30.