NETGEAR RAX30 Telnet CLI passwd Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-40478
6.8MEDIUM
Summary
A vulnerability exists in the telnet CLI service of the NETGEAR RAX30 router, which listens on TCP port 23. This security flaw arises from inadequate validation of input data length before it is copied to a fixed-length stack-based buffer. Although exploitation requires authentication, the mechanism in place can be bypassed, allowing attackers with network access to execute arbitrary code with root privileges. This poses a significant risk to users if the vulnerability is exploited, potentially compromising the integrity of the router and connected devices.
Affected Version(s)
RAX30 1.0.9.92_1
References
CVSS V3.1
Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved