2025-02-09 03:03:48 +00:00

67 lines
2.1 KiB
JSON

{
"id": "CVE-2024-23690",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-02-04T15:15:17.973",
"lastModified": "2025-02-04T15:15:17.973",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "disclosure@vulncheck.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The end-of-life Netgear FVS336Gv2 and FVS336Gv3 are affected by a command injection vulnerability in the Telnet interface. An authenticated and remote attacker can execute arbitrary OS commands as root over Telnet by sending crafted \"util backup_configuration\" commands."
},
{
"lang": "es",
"value": "Netgear FVS336Gv2 y FVS336Gv3 que han llegado al final de su vida \u00fatil se ven afectados por una vulnerabilidad de inyecci\u00f3n de comandos en la interfaz Telnet. Un atacante remoto autenticado puede ejecutar comandos arbitrarios del sistema operativo como superusuario a trav\u00e9s de Telnet enviando comandos manipulado \"util backup_configuration\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/netgear-fvs336g-rce",
"source": "disclosure@vulncheck.com"
}
]
}