NETGEAR RAX30 SOAP Request SQL Injection Remote Code Execution Vulnerability
CVE-2023-27358

8.8HIGH

Key Information:

Vendor
Netgear
Status
Vendor
CVE Published:
3 May 2024

Summary

A vulnerability exists within the NETGEAR RAX30 routers that allows network-adjacent attackers to execute arbitrary code due to improper handling of certain SOAP requests. The flaw arises from insufficient validation of user-supplied strings used in SQL query construction. This vulnerability can be exploited without the need for authentication, enabling attackers to leverage it alongside other weaknesses to execute code within the service account context, potentially compromising the security of affected installations.

Affected Version(s)

RAX30 1.0.9.90_3

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.