Lucene search

K
zdiClaroty Research - Vera Mens, Noam Moshe, Uri Katz, Sharon BrizinovZDI-23-499
HistoryMay 01, 2023 - 12:00 a.m.

(Pwn2Own) NETGEAR RAX30 soap_serverd Stack-based Buffer Overflow Authentication Bypass Vulnerability

2023-05-0100:00:00
Claroty Research - Vera Mens, Noam Moshe, Uri Katz, Sharon Brizinov
www.zerodayinitiative.com
13
netgear rax30
soap_serverd
buffer overflow
unauthenticated
remote code execution

0.0005 Low

EPSS

Percentile

16.4%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the soap_serverd binary. When parsing SOAP message headers, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to bypass authentication on the system.

0.0005 Low

EPSS

Percentile

16.4%

Related for ZDI-23-499