NETGEAR RAX30 rex_cgi JSON Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Authentication is required to exploit this vulnerability.
The specific flaw exists within the handling of JSON data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19355.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Jan 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Netgear rax30
|
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:* | |
Vendors & Products |
Netgear rax30
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-02T12:09:43.400Z
Reserved: 2023-02-28T17:58:45.484Z
Link: CVE-2023-27361

Updated: 2024-07-23T20:06:05.247Z

Status : Analyzed
Published: 2024-05-03T02:15:14.187
Modified: 2025-01-03T17:33:32.360
Link: CVE-2023-27361

No data.