Authentication Bypass Vulnerability in NETGEAR DGN1000 Router
CVE-2024-12847
Key Information:
Badges
What is CVE-2024-12847?
CVE-2024-12847 is a security vulnerability affecting the NETGEAR DGN1000 router, a device primarily used for residential networking and internet connectivity. This specific vulnerability involves an authentication bypass flaw that allows remote and unauthenticated attackers to execute arbitrary operating system commands with root privileges. If exploited, this could lead to unauthorized control of the router, putting configuration settings and connected devices at risk, and ultimately compromising an organization's network security.
Technical Details
The vulnerability exists in versions of the NETGEAR DGN1000 router prior to 1.1.00.48. Attackers can exploit this flaw by sending specially crafted HTTP requests to the routerβs setup.cgi endpoint. Given that this vulnerability allows execution of commands at the root level, it poses a significant threat as it may enable attackers to alter router settings, intercept network traffic, or deploy malicious payloads onto connected systems.
Potential impact of CVE-2024-12847
-
Unauthorized Access and Control: Attackers could gain full control over the router, allowing them to change settings, reconfigure the network, or compromise connected devices.
-
Data Interception: With control over network traffic, an attacker could potentially intercept sensitive information being transmitted over the network, leading to data breaches.
-
Increased Attack Surface: Exploiting this vulnerability could enable further attacks on the internal network by leveraging the compromised router as a launch point for lateral movement and deployment of additional malware or ransomware.
Affected Version(s)
DGN1000 0 < 1.1.00.48
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π
Vulnerability started trending
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published