CVE-2024-12847

CRITICAL EXPLOITED

Netgear Dgn1000 Firmware < 1.1.00.48 - Missing Authentication

Title source: rule

Description

NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been observed to be exploited in the wild since at least 2017 and specifically by the Shadowserver Foundation on 2025-02-06 UTC.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/43055
exploitdb WRITEUP
by Roberto Paleari · textwebappshardware
https://www.exploit-db.com/exploits/25978
metasploit WORKING POC EXCELLENT
by Mumbai, Robort Palerie <[email protected]> · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/netgear_dgn1000_setup_unauth_exec.rb

Scores

CVSS v3 9.8
EPSS 0.6932
EPSS Percentile 98.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2017-11-01

Classification

CWE
CWE-78 CWE-306
Status published

Affected Products (1)

netgear/dgn1000_firmware < 1.1.00.48

Timeline

Published Jan 10, 2025
Tracked Since Feb 18, 2026