PT-2023-2606 · NetGear · Netgear Srx5308

Leetsun

·

Published

2023-04-13

·

Updated

2024-05-17

·

CVE-2023-2386

CVSS v2.0
3.3
VectorAV:N/AC:L/Au:M/C:N/I:P/A:N
Name of the Vulnerable Software and Affected Versions Netgear SRX5308 versions up to 4.3.5-3
Description A vulnerability has been found in the Web Management Interface of Netgear SRX5308. The issue is due to insufficient input validation, which can be exploited by a remote attacker to conduct a cross-site scripting attack. This can be achieved by manipulating the
smtpServer.toAddr
argument in a specially crafted HTTP request to the "scgi-bin/platform.cgi?page=firewall logs email.htm" endpoint. The exploit has been disclosed publicly and may be used. The vendor was contacted about this disclosure but did not respond.
Recommendations For Netgear SRX5308 versions up to 4.3.5-3, consider disabling the Web Management Interface or restricting access to the "scgi-bin/platform.cgi?page=firewall logs email.htm" endpoint until a patch is available. Additionally, avoid using the
smtpServer.toAddr
argument in the affected endpoint to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

RCE

XSS

Weakness Enumeration

Related Identifiers

BDU:2023-02438
CVE-2023-2386

Affected Products

Netgear Srx5308