An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. The web management interface (setup.cgi) has an authentication bypass and other problems that ultimately allow an attacker to remotely compromise the device from a malicious webpage. The attacker sends an FW_remote.htm&todo=cfg_init request without a cookie, reads the Set-Cookie header in the 401 Unauthorized response, and then repeats the FW_remote.htm&todo=cfg_init request with the specified cookie.
References
Link | Resource |
---|---|
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-netgear-wnr1000v4-round-2/ | Third Party Advisory |
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-netgear-wnr1000v4-round-2/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-netgear-wnr1000v4-round-2/ - Third Party Advisory |
Information
Published : 2020-03-02 16:15
Updated : 2024-11-21 04:38
NVD link : CVE-2019-20489
Mitre link : CVE-2019-20489
CVE.ORG link : CVE-2019-20489
JSON object : View
Products Affected
netgear
- wnr1000
- wnr1000_firmware
CWE
CWE-287
Improper Authentication