Description
The administrative web interface on the Netgear DG632 with firmware 3.4.0_ap allows remote attackers to bypass authentication via a direct request to (1) gateway/commands/saveconfig.html, and (2) stattbl.htm, (3) modemmenu.htm, (4) onload.htm, (5) form.css, (6) utility.js, and possibly (7) indextop.htm in html/.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Tom Neaves · textremotehardware
https://www.exploit-db.com/exploits/8963
References (4)
Core 4
Core References
Exploit x_refsource_misc
http://www.tomneaves.co.uk/Netgear_DG632_Authentication_Bypass.txt
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/504312/100/0/threaded
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/8963
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1022404
Scores
EPSS
0.0410
EPSS Percentile
88.6%
Details
CWE
CWE-287
Status
published
Products (1)
netgear/dg632
3.4.0_ap
Published
Jun 30, 2009
Tracked Since
Feb 18, 2026