Remote Command Execution in NETGEAR ReadyNAS Surveillance Application
CVE-2017-18378

8.4HIGH

Key Information:

Vendor
Netgear
Vendor
CVE Published:
11 June 2019

Summary

The NETGEAR ReadyNAS Surveillance application prior to specified versions contains a vulnerability where the $_GET['uploaddir'] input is improperly handled. This allows attackers to exploit the PHP code, specifically within the upgrade_handle.php script, by injecting commands that are executed on the underlying system, resulting in potential unauthorized actions that could affect the integrity and availability of the service.

References

EPSS Score

15% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.