A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 11 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Netgear
Netgear rax30 Netgear rax30 Firmware |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax30_firmware:1.0.11.96:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax30_firmware:1.0.7.78:*:*:*:*:*:*:* |
|
Vendors & Products |
Netgear
Netgear rax30 Netgear rax30 Firmware |

Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-05T15:56:49.293Z
Reserved: 2023-12-01T22:00:57.981Z
Link: CVE-2023-48725

Updated: 2024-08-02T21:37:54.638Z

Status : Analyzed
Published: 2024-03-07T15:15:07.733
Modified: 2025-03-11T16:56:47.143
Link: CVE-2023-48725

No data.