When uploading a firmware image to a Netgear Nighthawk Wifi6 Router (RAX30), a hidden “forceFWUpdate” parameter may be provided to force the upgrade to complete and bypass certain validation checks. End users can use this to upload modified, unofficial, and potentially malicious firmware to the device.
References
Link | Resource |
---|---|
https://drupal9.tenable.com/security/research/tra-2023-12 | Permissions Required |
https://drupal9.tenable.com/security/research/tra-2023-12 | Permissions Required |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://drupal9.tenable.com/security/research/tra-2023-12 - Permissions Required |
Information
Published : 2023-03-15 23:15
Updated : 2024-11-21 07:54
NVD link : CVE-2023-28337
Mitre link : CVE-2023-28337
CVE.ORG link : CVE-2023-28337
JSON object : View
Products Affected
netgear
- rax30
- rax30_firmware
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type