NETGEAR RAX30 DHCP Server Command Injection Remote Code Execution Vulnerability
CVE-2023-40480

8.8HIGH

Key Information:

Vendor
Netgear
Status
Vendor
CVE Published:
3 May 2024

Summary

The vulnerability identified in the NETGEAR RAX30 router's DHCP server allows remote code execution due to improper validation of user-supplied input. An attacker exploiting this flaw can execute arbitrary code with root privileges without requiring authentication, thereby compromising the network's integrity and security. The flaw is linked to how the DHCP server handles user input, underscoring the critical importance of validation processes in safeguarding against potential exploits. Details are available through security advisories from the Zero Day Initiative and NETGEAR.

Affected Version(s)

RAX30 1.0.6.74_1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.