ID

VAR-202407-0376


CVE

CVE-2024-6646


TITLE

NETGEAR WN604 Information Disclosure Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-10442

DESCRIPTION

A vulnerability was found in Netgear WN604 up to 20240710. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /downloadFile.php of the component Web Interface. The manipulation of the argument file with the input config leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-271052. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. The vulnerability is caused by the insufficient protection of sensitive information in the parameter file of the file/downloadFile.php. Attackers can exploit this vulnerability to obtain sensitive information

Trust: 1.44

sources: NVD: CVE-2024-6646 // CNVD: CNVD-2025-10442

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-10442

AFFECTED PRODUCTS

vendor:netgearmodel:wn604scope:lteversion:<=20240710

Trust: 0.6

sources: CNVD: CNVD-2025-10442

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2024-6646
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2025-10442
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2024-6646
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2025-10442
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2024-6646
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2025-10442 // NVD: CVE-2024-6646

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.0

sources: NVD: CVE-2024-6646

EXTERNAL IDS

db:NVDid:CVE-2024-6646

Trust: 1.6

db:VULDBid:271052

Trust: 1.0

db:CNVDid:CNVD-2025-10442

Trust: 0.6

sources: CNVD: CNVD-2025-10442 // NVD: CVE-2024-6646

REFERENCES

url:https://github.com/mikutool/vul/issues/1

Trust: 1.0

url:https://vuldb.com/?ctiid.271052

Trust: 1.0

url:https://vuldb.com/?id.271052

Trust: 1.0

url:https://vuldb.com/?submit.367382

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2024-6646

Trust: 0.6

sources: CNVD: CNVD-2025-10442 // NVD: CVE-2024-6646

SOURCES

db:CNVDid:CNVD-2025-10442
db:NVDid:CVE-2024-6646

LAST UPDATE DATE

2025-05-23T23:11:24.097000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-10442date:2025-05-22T00:00:00
db:NVDid:CVE-2024-6646date:2024-07-11T13:05:54.930

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-10442date:2025-05-16T00:00:00
db:NVDid:CVE-2024-6646date:2024-07-10T18:15:05.480