CVE-2023-28337

When uploading a firmware image to a Netgear Nighthawk Wifi6 Router (RAX30), a hidden “forceFWUpdate” parameter may be provided to force the upgrade to complete and bypass certain validation checks. End users can use this to upload modified, unofficial, and potentially malicious firmware to the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:54

Type Values Removed Values Added
References () https://drupal9.tenable.com/security/research/tra-2023-12 - Permissions Required () https://drupal9.tenable.com/security/research/tra-2023-12 - Permissions Required

21 Mar 2023, 17:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-434
CPE cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*
References (MISC) https://drupal9.tenable.com/security/research/tra-2023-12 - (MISC) https://drupal9.tenable.com/security/research/tra-2023-12 - Permissions Required

15 Mar 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-15 23:15

Updated : 2024-11-21 07:54


NVD link : CVE-2023-28337

Mitre link : CVE-2023-28337

CVE.ORG link : CVE-2023-28337


JSON object : View

Products Affected

netgear

  • rax30
  • rax30_firmware
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type