NETGEAR RAX30 SOAP Request SQL Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of specific SOAP requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account. Was ZDI-CAN-19754.
                
            References
                    | Link | Resource | 
|---|---|
| https://kb.netgear.com/000065617/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2022-0349 | Vendor Advisory | 
| https://www.zerodayinitiative.com/advisories/ZDI-23-502/ | Third Party Advisory | 
| https://kb.netgear.com/000065617/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2022-0349 | Vendor Advisory | 
| https://www.zerodayinitiative.com/advisories/ZDI-23-502/ | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
Configuration 3 (hide)
| AND | 
 
 | 
Configuration 4 (hide)
| AND | 
 
 | 
Configuration 5 (hide)
| AND | 
 
 | 
History
                    09 Jan 2025, 15:37
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax38:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax38_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax35:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:raxe300:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax40_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:rax35_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:netgear:raxe300_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:rax40:-:*:*:*:*:*:*:* | |
| References | () https://kb.netgear.com/000065617/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2022-0349 - Vendor Advisory | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-23-502/ - Third Party Advisory | |
| First Time | Netgear rax35 Firmware Netgear rax38 Netgear rax40 Netgear raxe300 Netgear raxe300 Firmware Netgear Netgear rax30 Firmware Netgear rax30 Netgear rax35 Netgear rax38 Firmware Netgear rax40 Firmware | 
21 Nov 2024, 07:52
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://kb.netgear.com/000065617/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2022-0349 - | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-23-502/ - | |
| Summary | 
 | 
03 May 2024, 02:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-05-03 02:15
Updated : 2025-01-09 15:37
NVD link : CVE-2023-27358
Mitre link : CVE-2023-27358
CVE.ORG link : CVE-2023-27358
JSON object : View
Products Affected
                netgear
- rax30
- raxe300
- rax35_firmware
- rax38
- rax40
- rax40_firmware
- rax38_firmware
- rax30_firmware
- rax35
- raxe300_firmware
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
