NETGEAR RAX30 cmsCli_authenticate Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-34285
8.8HIGH
What is CVE-2023-34285?
This specific vulnerability in the NETGEAR RAX30 router is a stack-based buffer overflow stemming from inadequate validation of user-input data in a shared library associated with the telnetd service. The telnetd service, which commonly operates on TCP port 23, does not appropriately check the length of input data before it is copied into a stack-based buffer. As a result, network-adjacent attackers can exploit this flaw to execute arbitrary code with root privileges, potentially compromising the security of the device without the need for authentication.
Affected Version(s)
RAX30 1.0.9.92_1