NETGEAR ProSAFE RCE via Unrestricted File Upload in MFileUploadController
CVE-2023-38095 Published on May 3, 2024

NETGEAR ProSAFE Network Management System MFileUploadController Unrestricted File Upload Remote Code Execution Vulnerability
NETGEAR ProSAFE Network Management System MFileUploadController Unrestricted File Upload Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the MFileUploadController class. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-19717.

Vendor Advisory NVD

Weakness Type

What is an Unrestricted File Upload Vulnerability?

The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

CVE-2023-38095 has been classified to as an Unrestricted File Upload vulnerability or weakness.


Products Associated with CVE-2023-38095

Want to know whenever a new CVE is published for Netgear Prosafe Network Management System? stack.watch will email you.

 

Affected Versions

NETGEAR ProSAFE Network Management System: netgear prosafe_network_management_system:

Exploit Probability

EPSS
19.09%
Percentile
95.24%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.