Netgear WPN824v3 Unauthorized Config Download

2013.06.05
Credit: Jens Regel
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

Title: ====== Netgear WPN824v3 Unauthorized Config Download Date: ===== 2013-06-03 Introduction: ============= The Netgear RangeMax Wireless Router (model WPN824v3) allows to download the config file without authorization. Status: ======== Published Affected Products: ================== Netgear WPN824v3 Vendor Homepage: ================ http://support.netgear.com/product/WPN824v3 Exploitation-Technique: ======================= Local and Remote Details: ======== I found a bug in the Netgear WPN824v3 wireless router, everyone is able to download the full config file without authorization. Unfortunately the config file is not htaccess protected. Tested with latest firmware V1.0.8_1.0.6. Proof of Concept: ================= The vulnerability can be exploited with your browser: http://[local-ip]/cgi-bin/NETGEAR_wpn824v3.cfg If remote management is enabled: http://[remote-ip]:8080/cgi-bin/NETGEAR_wpn824v3.cfg Workaround: ========= Disable the remote management feature! Author: ======== Jens Regel <jens@loxiran.de>

References:

http://support.netgear.com/product/WPN824v3


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top