NETGEAR RAX30 USB Share Link Following Information Disclosure Vulnerability. This vulnerability allows physically present attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of symbolic links on removable USB media. By creating a symbolic link, an attacker can abuse the router's web server to access arbitrary local files. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-19498.
References
Configurations
No configuration.
History
21 Nov 2024, 08:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.netgear.com/000065650/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2023-0003-PSV-2023-0004?article=000065650 - | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-837/ - | |
Summary |
|
03 May 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-03 02:15
Updated : 2024-11-21 08:06
NVD link : CVE-2023-34283
Mitre link : CVE-2023-34283
CVE.ORG link : CVE-2023-34283
JSON object : View
Products Affected
No product.
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')