Netgear

Rax30 Firmware

31 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 31.01%
  • Veröffentlicht 07.03.2024 15:15:07
  • Zuletzt bearbeitet 04.11.2025 19:16:07

A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP r...

  • EPSS 0.09%
  • Veröffentlicht 15.03.2023 23:15:09
  • Zuletzt bearbeitet 21.11.2024 07:54:52

Any request send to a Netgear Nighthawk Wifi6 Router (RAX30)'s web service containing a “Content-Type” of “multipartboundary=” will result in the request body being written to “/tmp/mulipartFile” on the device itself. A sufficiently large file will c...

  • EPSS 0.09%
  • Veröffentlicht 15.03.2023 23:15:09
  • Zuletzt bearbeitet 21.11.2024 07:54:52

When uploading a firmware image to a Netgear Nighthawk Wifi6 Router (RAX30), a hidden “forceFWUpdate” parameter may be provided to force the upgrade to complete and bypass certain validation checks. End users can use this to upload modified, unoffici...

  • EPSS 0.12%
  • Veröffentlicht 14.03.2023 22:15:10
  • Zuletzt bearbeitet 21.11.2024 07:38:55

Netgear RAX30 (AX2400), prior to version 1.0.6.74, was affected by an authentication bypass vulnerability, allowing an unauthenticated attacker to gain administrative access to the device's web management interface by resetting the admin password.

  • EPSS 3.56%
  • Veröffentlicht 10.03.2023 18:15:17
  • Zuletzt bearbeitet 27.02.2025 22:15:36

NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a format string vulnerability in a SOAP service that could allow an attacker to execute arbitrary code on the device.

  • EPSS 0.21%
  • Veröffentlicht 10.03.2023 18:15:17
  • Zuletzt bearbeitet 27.02.2025 21:15:20

NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a buffer overflow vulnerability in various CGI mechanisms that could allow an attacker to execute arbitrary code on the device.

  • EPSS 0.17%
  • Veröffentlicht 10.03.2023 18:15:17
  • Zuletzt bearbeitet 27.02.2025 22:15:36

NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a file sharing mechanism that unintentionally allows users with upload permissions to execute arbitrary code on the device.

  • EPSS 0.07%
  • Veröffentlicht 10.03.2023 18:15:16
  • Zuletzt bearbeitet 28.02.2025 17:15:15

NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a file sharing mechanism that allows users with access to this feature to access arbitrary files on the device.

  • EPSS 0.1%
  • Veröffentlicht 10.03.2023 18:15:16
  • Zuletzt bearbeitet 28.02.2025 17:15:13

NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 is vulnerable to cross-site request forgery attacks on all endpoints due to improperly implemented CSRF protections.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 16.12.2022 20:15:09
  • Zuletzt bearbeitet 17.04.2025 19:15:54

The default console presented to users over telnet (when enabled) is restricted to a subset of commands. Commands issued at this console, however, appear to be fed directly into a system call or other similar function. This allows any authenticated u...