Authentication Bypass Vulnerability in NETGEAR DGN1000 Router
CVE-2024-12847

9.8CRITICAL

Key Information:

Vendor
Netgear
Status
Vendor
CVE Published:
10 January 2025

Badges

πŸ”₯ Trending nowπŸ“ˆ TrendedπŸ“ˆ Score: 2,200πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2024-12847?

CVE-2024-12847 is a security vulnerability affecting the NETGEAR DGN1000 router, a device primarily used for residential networking and internet connectivity. This specific vulnerability involves an authentication bypass flaw that allows remote and unauthenticated attackers to execute arbitrary operating system commands with root privileges. If exploited, this could lead to unauthorized control of the router, putting configuration settings and connected devices at risk, and ultimately compromising an organization's network security.

Technical Details

The vulnerability exists in versions of the NETGEAR DGN1000 router prior to 1.1.00.48. Attackers can exploit this flaw by sending specially crafted HTTP requests to the router’s setup.cgi endpoint. Given that this vulnerability allows execution of commands at the root level, it poses a significant threat as it may enable attackers to alter router settings, intercept network traffic, or deploy malicious payloads onto connected systems.

Potential impact of CVE-2024-12847

  1. Unauthorized Access and Control: Attackers could gain full control over the router, allowing them to change settings, reconfigure the network, or compromise connected devices.

  2. Data Interception: With control over network traffic, an attacker could potentially intercept sensitive information being transmitted over the network, leading to data breaches.

  3. Increased Attack Surface: Exploiting this vulnerability could enable further attacks on the internal network by leveraging the compromised router as a launch point for lateral movement and deployment of additional malware or ransomware.

Affected Version(s)

DGN1000 0 < 1.1.00.48

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ“ˆ

    Vulnerability started trending

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

Credit

Roberto Paleari
.