Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-48725: CWE-121: Stack-based Buffer Overflow in Netgear RAX30

0
High
VulnerabilityCVE-2023-48725cvecve-2023-48725cwe-121
Published: Thu Mar 07 2024 (03/07/2024, 14:59:08 UTC)
Source: CVE Database V5
Vendor/Project: Netgear
Product: RAX30

Description

A stack-based buffer overflow vulnerability exists in the JSON Parsing getblockschedule() functionality of Netgear RAX30 1.0.11.96 and 1.0.7.78. A specially crafted HTTP request can lead to code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:04:52 UTC

Technical Analysis

CVE-2023-48725 is a stack-based buffer overflow vulnerability identified in the Netgear RAX30 router models running firmware versions 1.0.11.96 and 1.0.7.78. The flaw exists within the JSON parsing functionality of the getblockschedule() method, which processes HTTP requests. Specifically, the vulnerability arises when a specially crafted HTTP request is sent to the device, causing the stack buffer to overflow. This overflow can overwrite critical memory regions, enabling an attacker to execute arbitrary code on the device. Exploitation requires the attacker to be authenticated, meaning they must have valid credentials to access the router's HTTP management interface. The vulnerability has a CVSS 3.1 base score of 7.2, reflecting high severity due to its impact on confidentiality, integrity, and availability, combined with low attack complexity and no requirement for user interaction. Although no known exploits are currently reported in the wild, the potential for remote code execution makes this a critical issue for affected users. The vulnerability is classified under CWE-121, which pertains to stack-based buffer overflows, a common and dangerous class of memory corruption bugs. The absence of available patches at the time of reporting increases the urgency for mitigation through access controls and monitoring. This vulnerability could allow attackers to gain control over the router, intercept or manipulate network traffic, and disrupt network services.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Compromise of Netgear RAX30 routers could lead to unauthorized access to internal networks, interception of sensitive data, and disruption of internet connectivity. Given that routers serve as critical network gateways, successful exploitation could facilitate lateral movement within corporate networks, potentially exposing confidential information and critical systems. The high severity score indicates that confidentiality, integrity, and availability are all at risk. Organizations relying on these devices for home office setups, small branch offices, or IoT network segmentation could face increased exposure. Additionally, critical infrastructure sectors such as finance, healthcare, and government agencies using these routers may experience severe operational impacts. The requirement for authentication reduces the attack surface but does not eliminate risk, especially if credential management is weak or default passwords remain in use. The lack of known exploits in the wild currently provides a limited window for proactive defense before potential attackers develop and deploy exploit code.

Mitigation Recommendations

1. Immediately restrict administrative access to the Netgear RAX30 router management interface by limiting it to trusted IP addresses and using VPNs for remote access. 2. Enforce strong, unique passwords and multi-factor authentication where supported to prevent unauthorized authentication. 3. Monitor router logs and network traffic for unusual or suspicious HTTP requests targeting the getblockschedule() functionality or other management endpoints. 4. Disable remote management features if not required to reduce exposure. 5. Segment network infrastructure to isolate critical assets from devices running vulnerable firmware. 6. Regularly check Netgear’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 7. Consider replacing affected devices with models that have confirmed security updates if patching is delayed. 8. Conduct internal audits to identify all Netgear RAX30 devices in use across the organization to ensure comprehensive mitigation. 9. Educate IT staff about this vulnerability and the importance of credential hygiene to reduce risk of authenticated exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-12-01T22:00:57.981Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47396d939959c8021b9a

Added to database: 11/4/2025, 6:34:33 PM

Last enriched: 11/4/2025, 7:04:52 PM

Last updated: 11/5/2025, 3:20:52 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats