HTTP: Netgear DGN1000B setup.cgi Remote Command Execution

This signature detects attempts to exploit a known vulnerability in the Netgear DGN1000B wi-fi router. It is due to insufficient parameter validation. In a successful code injection attack, the behavior of the target host is entirely dependent on the intended function of the injected code and executes within the security context of the currently logged in user. If the attack is unsuccessful, the vulnerable application can terminate abnormally.

References

BugTraq: 57836

Short Name
HTTP:NETGEAR:DGN1000B-SETUP-RCE
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Command DGN1000B Execution Netgear Remote bid:57836 setup.cgi
Release Date
04/17/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3324
False Positive
Unknown

Found a potential security threat?