NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a buffer overflow vulnerability in various CGI mechanisms that could allow an attacker to execute arbitrary code on the device.
References
Link | Resource |
---|---|
https://tenable.com/security/research/tra-2023-9 | Third Party Advisory |
https://tenable.com/security/research/tra-2023-9 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://tenable.com/security/research/tra-2023-9 - Third Party Advisory |
16 Mar 2023, 14:14
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
CPE | cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://tenable.com/security/research/tra-2023-9 - Third Party Advisory |
10 Mar 2023, 18:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-10 18:15
Updated : 2025-02-27 21:15
NVD link : CVE-2023-27852
Mitre link : CVE-2023-27852
CVE.ORG link : CVE-2023-27852
JSON object : View
Products Affected
netgear
- rax30
- rax30_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')