An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. The web management interface (setup.cgi) has an authentication bypass and other problems that ultimately allow an attacker to remotely compromise the device from a malicious webpage. The attacker sends an FW_remote.htm&todo=cfg_init request without a cookie, reads the Set-Cookie header in the 401 Unauthorized response, and then repeats the FW_remote.htm&todo=cfg_init request with the specified cookie.
References
Link | Resource |
---|---|
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-netgear-wnr1000v4-round-2/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-03-02 08:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-20489
Mitre link : CVE-2019-20489
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
netgear
- wnr1000
- wnr1000_firmware