NETGEAR RAX30 SOAP Request SQL Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of specific SOAP requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account. Was ZDI-CAN-19754.
References
Link | Resource |
---|---|
https://kb.netgear.com/000065617/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2022-0349 | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-23-502/ | Third Party Advisory |
https://kb.netgear.com/000065617/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2022-0349 | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-23-502/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
09 Jan 2025, 15:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:netgear:rax40_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax40:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax38:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax35_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:raxe300:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax38_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:raxe300_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax35:-:*:*:*:*:*:*:* |
|
References | () https://kb.netgear.com/000065617/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2022-0349 - Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-502/ - Third Party Advisory | |
First Time |
Netgear rax30
Netgear rax35 Firmware Netgear rax38 Firmware Netgear Netgear raxe300 Firmware Netgear rax40 Netgear raxe300 Netgear rax35 Netgear rax40 Firmware Netgear rax30 Firmware Netgear rax38 |
21 Nov 2024, 07:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.netgear.com/000065617/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2022-0349 - | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-502/ - | |
Summary |
|
03 May 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-03 02:15
Updated : 2025-01-09 15:37
NVD link : CVE-2023-27358
Mitre link : CVE-2023-27358
CVE.ORG link : CVE-2023-27358
JSON object : View
Products Affected
netgear
- rax30_firmware
- rax38_firmware
- rax40
- raxe300
- rax35_firmware
- raxe300_firmware
- rax30
- rax38
- rax40_firmware
- rax35
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')