NETGEAR ProSAFE Network Management System UpLoadServlet Unrestricted File Upload Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the UpLoadServlet class. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-19720.
Metrics
Affected Vendors & Products
References
History
Thu, 06 Feb 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 19 Sep 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Netgear
Netgear prosafe Network Management System |
|
CPEs | cpe:2.3:a:netgear:prosafe_network_management_system:*:*:*:*:*:*:*:* | |
Vendors & Products |
Netgear
Netgear prosafe Network Management System |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-09-18T18:29:32.388Z
Reserved: 2023-07-12T15:22:20.618Z
Link: CVE-2023-38098

Updated: 2024-08-02T17:30:14.353Z

Status : Analyzed
Published: 2024-05-03T02:15:52.453
Modified: 2025-02-06T18:01:42.617
Link: CVE-2023-38098

No data.