Vulnerability Description
The administrative web interface on the Netgear DG632 with firmware 3.4.0_ap allows remote attackers to bypass authentication via a direct request to (1) gateway/commands/saveconfig.html, and (2) stattbl.htm, (3) modemmenu.htm, (4) onload.htm, (5) form.css, (6) utility.js, and possibly (7) indextop.htm in html/.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Dg632 | 3.4.0_ap |
Related Weaknesses (CWE)
References
- http://securitytracker.com/id?1022404Exploit
- http://www.exploit-db.com/exploits/8963
- http://www.securityfocus.com/archive/1/504312/100/0/threaded
- http://www.tomneaves.co.uk/Netgear_DG632_Authentication_Bypass.txtExploit
- http://securitytracker.com/id?1022404Exploit
- http://www.exploit-db.com/exploits/8963
- http://www.securityfocus.com/archive/1/504312/100/0/threaded
- http://www.tomneaves.co.uk/Netgear_DG632_Authentication_Bypass.txtExploit
FAQ
What is CVE-2009-2257?
CVE-2009-2257 is a vulnerability with a CVSS score of 7.8 (HIGH). The administrative web interface on the Netgear DG632 with firmware 3.4.0_ap allows remote attackers to bypass authentication via a direct request to (1) gateway/commands/saveconfig.html, and (2) stat...
How severe is CVE-2009-2257?
CVE-2009-2257 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-2257?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Dg632.