Remote Command Execution in NETGEAR ReadyNAS Surveillance Application
CVE-2017-18378
8.4HIGH
Summary
The NETGEAR ReadyNAS Surveillance application prior to specified versions contains a vulnerability where the $_GET['uploaddir'] input is improperly handled. This allows attackers to exploit the PHP code, specifically within the upgrade_handle.php script, by injecting commands that are executed on the underlying system, resulting in potential unauthorized actions that could affect the integrity and availability of the service.
References
EPSS Score
15% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved