Vulnerability Description
A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Rax30 Firmware | 1.0.7.78 |
| Netgear | Rax30 | - |
Related Weaknesses (CWE)
References
- https://kb.netgear.com/000066037/Security-Advisory-for-Post-Authentication-StackVendor Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887ExploitThird Party Advisory
- https://kb.netgear.com/000066037/Security-Advisory-for-Post-Authentication-StackVendor Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887ExploitThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1887
FAQ
What is CVE-2023-48725?
CVE-2023-48725 is a vulnerability with a CVSS score of 7.2 (HIGH). A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execu...
How severe is CVE-2023-48725?
CVE-2023-48725 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-48725?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Rax30 Firmware, Netgear Rax30.