Vulnerability Description
NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been observed to be exploited in the wild since at least 2017 and specifically by the Shadowserver Foundation on 2025-02-06 UTC.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Dgn1000 Firmware | < 1.1.00.48 |
| Netgear | Dgn1000 | - |
Related Weaknesses (CWE)
References
- https://seclists.org/bugtraq/2013/Jun/8Mailing ListThird Party Advisory
- https://vulncheck.com/advisories/netgear-dgnVendor Advisory
- https://www.exploit-db.com/exploits/25978ExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/43055ExploitVDB Entry
FAQ
What is CVE-2024-12847?
CVE-2024-12847 is a vulnerability with a CVSS score of 9.8 (CRITICAL). NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending craft...
How severe is CVE-2024-12847?
CVE-2024-12847 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-12847?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Dgn1000 Firmware, Netgear Dgn1000.