NETGEAR ProSAFE RCE via Unrestricted File Upload in MFileUploadController
CVE-2023-38095 Published on May 3, 2024
NETGEAR ProSAFE Network Management System MFileUploadController Unrestricted File Upload Remote Code Execution Vulnerability
NETGEAR ProSAFE Network Management System MFileUploadController Unrestricted File Upload Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the MFileUploadController class. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-19717.
Weakness Type
What is an Unrestricted File Upload Vulnerability?
The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
CVE-2023-38095 has been classified to as an Unrestricted File Upload vulnerability or weakness.
Products Associated with CVE-2023-38095
Want to know whenever a new CVE is published for Netgear Prosafe Network Management System? stack.watch will email you.
Affected Versions
NETGEAR ProSAFE Network Management System:- Version 1.7.0.12 (Win64) is affected.
- Before 1.7.0.20 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.