ID
VAR-E-201306-0696
TITLE
Netgear WPN824v3 Unauthorized Config Download
Trust: 0.5
DESCRIPTION
Netgear WPN824v3 allows for a remote party to download the configuration file unauthenticated.
Trust: 0.5
AFFECTED PRODUCTS
vendor: | netgear | model: | wpn824v3 | scope: | - | version: | - | Trust: 0.5 |
EXPLOIT
Title:
======
Netgear WPN824v3 Unauthorized Config Download
Date:
=====
2013-06-03
Introduction:
=============
The Netgear RangeMax Wireless Router (model WPN824v3) allows to download
the config file without authorization.
Status:
========
Published
Affected Products:
==================
Netgear WPN824v3
Vendor Homepage:
================
http://support.netgear.com/product/WPN824v3
Exploitation-Technique:
=======================
Local and Remote
Details:
========
I found a bug in the Netgear WPN824v3 wireless router, everyone is able
to download the full config file without authorization.
Unfortunately the config file is not htaccess protected.
Tested with latest firmware V1.0.8_1.0.6.
Proof of Concept:
=================
The vulnerability can be exploited with your browser:
http://[local-ip]/cgi-bin/NETGEAR_wpn824v3.cfg
If remote management is enabled:
http://[remote-ip]:8080/cgi-bin/NETGEAR_wpn824v3.cfg
Workaround:
=========
Disable the remote management feature!
Author:
========
Jens Regel <jens@loxiran.de>
Trust: 0.5
EXPLOIT HASH
LOCAL | SOURCE | ||||||||
|
|
Trust: 0.5
PRICE
free
Trust: 0.5
TAGS
tag: | exploit | Trust: 0.5 |
tag: | remote | Trust: 0.5 |
CREDITS
Jens Regel
Trust: 0.5
EXTERNAL IDS
db: | PACKETSTORM | id: | 121865 | Trust: 0.5 |
SOURCES
db: | PACKETSTORM | id: | 121865 |
LAST UPDATE DATE
2022-07-27T09:12:05.828000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 121865 | date: | 2013-06-03T23:36:05 |