CVSS 3.1 Score 7.2 of 10 (high)


Published Mar 7, 2024
Updated: Mar 8, 2024
CWE ID 121


CVE-2023-48725 is a stack-based buffer overflow vulnerability found in the JSON Parsing getblockschedule() functionality of Netgear RAX30 routers with firmware versions and This vulnerability can be exploited by an authenticated attacker through a specially crafted HTTP request, leading to code execution. The risk score for this vulnerability is 25, indicating a high severity level. The base score is 7.2, with high impact on integrity and confidentiality of the affected system. Remediation for this vulnerability should include updating the firmware to a version that addresses this issue, as specified by Netgear or the vendor. Organizations using these routers should take immediate action to mitigate the potential danger posed by this vulnerability by applying the necessary updates or patches provided by Netgear.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-48725 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options