NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been observed to be exploited in the wild since at least 2017 and specifically by the Shadowserver Foundation on 2025-02-06 UTC.
References
| Link | Resource |
|---|---|
| https://seclists.org/bugtraq/2013/Jun/8 | Mailing List Third Party Advisory |
| https://vulncheck.com/advisories/netgear-dgn | Vendor Advisory |
| https://www.exploit-db.com/exploits/25978 | Exploit Third Party Advisory VDB Entry |
| https://www.exploit-db.com/exploits/43055 | Exploit VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-01-10 20:15
Updated : 2025-12-19 20:15
NVD link : CVE-2024-12847
Mitre link : CVE-2024-12847
CVE.ORG link : CVE-2024-12847
JSON object : View
Products Affected
netgear
- dgn1000_firmware
- dgn1000
