Netgear R6850 - Information Disclosure
ID: CVE-2024-30570
Severity: medium
Author: ritikchaddha
Tags: cve,cve2024,netgear,router,exposure,unauth
Description
Section titled “Description”Netgear R6850 router firmware version V1.1.0.88 contains an information leakage vulnerability in the debuginfo.htm page. This hidden interface is not protected by authentication, allowing unauthenticated attackers to access sensitive informationsuch as product model name, WAN connection type, and potentially other system details.
YAML Source
Section titled “YAML Source”id: CVE-2024-30570
info: name: Netgear R6850 - Information Disclosure author: ritikchaddha severity: medium description: | Netgear R6850 router firmware version V1.1.0.88 contains an information leakage vulnerability in the debuginfo.htm page. This hidden interface is not protected by authentication, allowing unauthenticated attackers to access sensitive informationsuch as product model name, WAN connection type, and potentially other system details. remediation: | Restrict access to the debuginfo.htm page by implementing proper authentication. Keep router firmware updated to the latest version once a patch is available. reference: - https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Info%20Leak%20in%20Netgear-R6850%EF%BC%88debuginfo.htm%EF%BC%89.md - https://nvd.nist.gov/vuln/detail/CVE-2024-30570 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2024-30570 cwe-id: CWE-200 metadata: verified: true max-request: 1 product: Netgear R6850 Router vendor: Netgear version: V1.1.0.88 fofa-query: app="NETGEAR" && "R6850" tags: cve,cve2024,netgear,router,exposure,unauth
http: - method: GET path: - "{{BaseURL}}/debuginfo.htm"
matchers-condition: and matchers: - type: word part: body words: - "<br>WAN connection type"
- type: status status: - 200# digest: 4b0a00483046022100cfb706feb76b2b8b59336ad2a2283b8ef92eb7ab676db0d07545b1bc1fe8d2bd022100b108d2e5a91651c862a2c36fd81fd78ba5e8e69cf9f33e2107beca44667e3c63:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-30570.yaml"