CVE-2023-34283
NETGEAR RAX30 USB Share Link Following Information Disclosure Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
NETGEAR RAX30 USB Share Link Following Information Disclosure Vulnerability. This vulnerability allows physically present attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of symbolic links on removable USB media. By creating a symbolic link, an attacker can abuse the router's web server to access arbitrary local files. An attacker can leverage this vulnerability to disclose information in the context of root. Was ZDI-CAN-19498.
Vulnerabilidad de divulgación de información siguiente del enlace compartido USB de NETGEAR RAX30. Esta vulnerabilidad permite a atacantes físicamente presentes revelar información confidencial sobre las instalaciones afectadas de los enrutadores NETGEAR RAX30. No se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe en el manejo de enlaces simbólicos en medios USB extraíbles. Al crear un enlace simbólico, un atacante puede abusar del servidor web del enrutador para acceder a archivos locales arbitrarios. Un atacante puede aprovechar esta vulnerabilidad para revelar información en el contexto de la raíz. Era ZDI-CAN-19498.
This vulnerability allows physically present attackers to disclose sensitive information on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of symbolic links on removable USB media. By creating a symbolic link, an attacker can abuse the router's web server to access arbitrary local files. An attacker can leverage this vulnerability to disclose information in the context of root.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2023-05-31 CVE Reserved
- 2023-06-08 CVE Published
- 2024-08-02 CVE Updated
- 2025-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-837 | X_research Advisory |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Netgear Search vendor "Netgear" | Rax30 Firmware Search vendor "Netgear" for product "Rax30 Firmware" | * | - |
Affected
| ||||||
Netgear Search vendor "Netgear" | Rax30 Firmware Search vendor "Netgear" for product "Rax30 Firmware" | * | - |
Affected
|