CVE-2023-48725

CVSS 3.1 Score 7.2 of 10 (high)

Details

Published Mar 7, 2024
Updated: Mar 8, 2024
CWE ID 121

Summary

CVE-2023-48725 is a stack-based buffer overflow vulnerability found in the JSON Parsing getblockschedule() functionality of Netgear RAX30 routers with firmware versions 1.0.11.96 and 1.0.7.78. This vulnerability can be exploited by an authenticated attacker through a specially crafted HTTP request, leading to code execution. The risk score for this vulnerability is 25, indicating a high severity level. The base score is 7.2, with high impact on integrity and confidentiality of the affected system. Remediation for this vulnerability should include updating the firmware to a version that addresses this issue, as specified by Netgear or the vendor. Organizations using these routers should take immediate action to mitigate the potential danger posed by this vulnerability by applying the necessary updates or patches provided by Netgear.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-48725 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions