In Netgear RAX30 V1.0.10.94, a PHP-FPM misconfiguration vulnerability is caused by not following the specification to only limit FPM to .php extensions. An attacker may exploit this by uploading malicious scripts disguised with alternate extensions and tricking the web server into executing them as PHP, bypassing security mechanisms based on file extension filtering. This may lead to remote code execution (RCE), information disclosure, or full system compromise.
References
| Link | Resource |
|---|---|
| https://gist.github.com/TPCchecker/c72eea7a3f89070dab7dfdbf7504b2d6 | Broken Link |
| https://www.netgear.com/about/security/ | Vendor Advisory |
| https://www.notion.so/CVE-2025-44658-24754a1113e780df8f72c779a108f75b | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-07-21 16:15
Updated : 2025-08-07 17:57
NVD link : CVE-2025-44658
Mitre link : CVE-2025-44658
CVE.ORG link : CVE-2025-44658
JSON object : View
Products Affected
netgear
- rax30
- rax30_firmware
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
