Skip to content

Netgear R6850 - Information Disclosure

ID: CVE-2024-30570

Severity: medium

Author: ritikchaddha

Tags: cve,cve2024,netgear,router,exposure,unauth

Netgear R6850 router firmware version V1.1.0.88 contains an information leakage vulnerability in the debuginfo.htm page. This hidden interface is not protected by authentication, allowing unauthenticated attackers to access sensitive informationsuch as product model name, WAN connection type, and potentially other system details.

id: CVE-2024-30570
info:
name: Netgear R6850 - Information Disclosure
author: ritikchaddha
severity: medium
description: |
Netgear R6850 router firmware version V1.1.0.88 contains an information leakage vulnerability in the debuginfo.htm page. This hidden interface is not protected by authentication, allowing unauthenticated attackers to access sensitive informationsuch as product model name, WAN connection type, and potentially other system details.
remediation: |
Restrict access to the debuginfo.htm page by implementing proper authentication. Keep router firmware updated to the latest version once a patch is available.
reference:
- https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Info%20Leak%20in%20Netgear-R6850%EF%BC%88debuginfo.htm%EF%BC%89.md
- https://nvd.nist.gov/vuln/detail/CVE-2024-30570
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2024-30570
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
product: Netgear R6850 Router
vendor: Netgear
version: V1.1.0.88
fofa-query: app="NETGEAR" && "R6850"
tags: cve,cve2024,netgear,router,exposure,unauth
http:
- method: GET
path:
- "{{BaseURL}}/debuginfo.htm"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<br>WAN connection type"
- type: status
status:
- 200
# digest: 4b0a00483046022100cfb706feb76b2b8b59336ad2a2283b8ef92eb7ab676db0d07545b1bc1fe8d2bd022100b108d2e5a91651c862a2c36fd81fd78ba5e8e69cf9f33e2107beca44667e3c63:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-30570.yaml"

View on Github