An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. The web management interface (setup.cgi) has an authentication bypass and other problems that ultimately allow an attacker to remotely compromise the device from a malicious webpage. The attacker sends an FW_remote.htm&todo=cfg_init request without a cookie, reads the Set-Cookie header in the 401 Unauthorized response, and then repeats the FW_remote.htm&todo=cfg_init request with the specified cookie.
References
Link | Resource |
---|---|
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-netgear-wnr1000v4-round-2/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-03-02T15:06:16
Updated: 2020-03-02T15:06:16
Reserved: 2020-03-02T00:00:00
Link: CVE-2019-20489
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-03-02T16:15:12.253
Modified: 2020-08-24T17:37:01.140
Link: CVE-2019-20489
JSON object: View
Redhat Information
No data.
CWE