ID

VAR-202406-1250


CVE

CVE-2024-36789


TITLE

of netgear  WNR614  Weak password requirement vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-024409

DESCRIPTION

An issue in Netgear WNR614 JNR1010V2/N300-V1.1.0.54_1.0.1 allows attackers to create passwords that do not conform to defined security standards. of netgear WNR614 A weak password requirement vulnerability exists in the firmware.Information may be obtained and information may be tampered with. Netgear WNR614 is an N300 wireless router with an external antenna from Netgear. No detailed vulnerability details are available at this time

Trust: 2.16

sources: NVD: CVE-2024-36789 // JVNDB: JVNDB-2024-024409 // CNVD: CNVD-2025-13420

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-13420

AFFECTED PRODUCTS

vendor:netgearmodel:wnr614scope:eqversion:1.1.0.54_1.0.1

Trust: 1.0

vendor:ネットギアmodel:wnr614scope:eqversion: -

Trust: 0.8

vendor:ネットギアmodel:wnr614scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:wnr614scope:eqversion:wnr614 firmware 1.1.0.54 1.0.1

Trust: 0.8

vendor:netgearmodel:wnr614 jnr1010v2/n300-v1.1.0.54 1.0.1scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-13420 // JVNDB: JVNDB-2024-024409 // NVD: CVE-2024-36789

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-36789
value: HIGH

Trust: 1.0

OTHER: JVNDB-2024-024409
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-13420
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-13420
severity: HIGH
baseScore: 7.8
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 6.5
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-36789
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 5.2
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-024409
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-13420 // JVNDB: JVNDB-2024-024409 // NVD: CVE-2024-36789

PROBLEMTYPE DATA

problemtype:CWE-521

Trust: 1.0

problemtype:Weak password request (CWE-521) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-024409 // NVD: CVE-2024-36789

EXTERNAL IDS

db:NVDid:CVE-2024-36789

Trust: 3.2

db:JVNDBid:JVNDB-2024-024409

Trust: 0.8

db:CNVDid:CNVD-2025-13420

Trust: 0.6

sources: CNVD: CNVD-2025-13420 // JVNDB: JVNDB-2024-024409 // NVD: CVE-2024-36789

REFERENCES

url:https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-netgear-wnr614-router/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-36789

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2024-36789

Trust: 0.6

sources: CNVD: CNVD-2025-13420 // JVNDB: JVNDB-2024-024409 // NVD: CVE-2024-36789

SOURCES

db:CNVDid:CNVD-2025-13420
db:JVNDBid:JVNDB-2024-024409
db:NVDid:CVE-2024-36789

LAST UPDATE DATE

2025-06-26T23:23:12.326000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-13420date:2025-06-25T00:00:00
db:JVNDBid:JVNDB-2024-024409date:2025-05-30T02:39:00
db:NVDid:CVE-2024-36789date:2025-05-29T16:12:26.160

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-13420date:2025-06-25T00:00:00
db:JVNDBid:JVNDB-2024-024409date:2025-05-30T00:00:00
db:NVDid:CVE-2024-36789date:2024-06-07T15:15:50.323