QID 731252

Date Published: 2024-03-14

QID 731252: NETGEAR ProSAFE Plus Remote Code Execution (RCE) Vulnerability

NETGEAR ProSAFE Plus before 2.6.0.43 is susceptible to unauthenticated remote code execution vulnerability. Any HTML page is allowed as a valid endpoint to submit POST requests, allowing debug action via the 'submitId' and 'debugCmd' parameters. The problem is publicly exposed in the login.html webpage, which has to be publicly available to perform login requests but does not implement any restriction for executing debug actions.

Affected Versions:
NETGEAR JGS516PE devices prior to v2.6.0.43.

QID Detection Logic (Unauthenticated):
This QID sends a crafted payload as an HTTP POST request that triggers a callback to the scanner, if vulnerable. Please note that this QID relies on a callback to the scanner on a random port. The target must be enabled to connect back to any random port on the scanner.

Successful exploitation of the vulnerability may allow an unauthenticated attacker to execute arbitrary code, leading to complete system compromise.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Vendor has released patch addressing the vulnerability. Customers are advised to upgrade their JGS516PE devices to the latest available version. For more information, please refer to the Netgear Security Advisory

    CVEs related to QID 731252

    Software Advisories
    Advisory ID Software Component Link
    PSV-2020-0377 URL Logo kb.netgear.com/000062334/Security-Advisory-for-Missing-Function-Level-Access-Control-on-JGS516PE-PSV-2020-0377