A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
References
Configurations
No configuration.
History
21 Nov 2024, 08:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.netgear.com/000066037/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-the-RAX30-PSV-2023-0160 - | |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887 - |
08 Mar 2024, 14:02
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 Mar 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Mar 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Mar 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-07 15:15
Updated : 2024-11-21 08:32
NVD link : CVE-2023-48725
Mitre link : CVE-2023-48725
CVE.ORG link : CVE-2023-48725
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow