CVE-2024-12847
NETGEAR DGN setup.cgi OS Command Injection
Severity Score
9.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been exploited in the wild since at least 2017.
*Credits:
Roberto Paleari
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-12-20 CVE Reserved
- 2025-01-10 CVE Published
- 2025-01-10 CVE Updated
- 2025-01-10 First Exploit
- 2025-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-288: Authentication Bypass Using an Alternate Path or Channel
CAPEC
- CAPEC-115: Authentication Bypass
References (4)
URL | Tag | Source |
---|---|---|
https://seclists.org/bugtraq/2013/Jun/8 | Technical Description |
|
https://vulncheck.com/advisories/netgear-dgn | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/25978 | 2025-01-10 | |
https://www.exploit-db.com/exploits/43055 | 2025-01-10 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
NETGEAR Search vendor "NETGEAR" | DGN1000 Search vendor "NETGEAR" for product "DGN1000" | < 1.1.00.48 Search vendor "NETGEAR" for product "DGN1000" and version " < 1.1.00.48" | en |
Affected
|