CVE-2022-46424

An exploitable firmware modification vulnerability was discovered on the Netgear XWN5001 Powerline 500 WiFi Access Point. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v0.4.1.1 and earlier.
References
Link Resource
https://hackmd.io/@slASVrz_SrW7NQCsunofeA/B1rKQuzDj Exploit Third Party Advisory
https://www.netgear.com/about/security/ Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:xwn5001_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:xwn5001:-:*:*:*:*:*:*:*

Information

Published : 2022-12-20 12:15

Updated : 2022-12-29 09:05


NVD link : CVE-2022-46424

Mitre link : CVE-2022-46424


JSON object : View

Advertisement

dedicated server usa

Products Affected

netgear

  • xwn5001_firmware
  • xwn5001