CVE-2021-35973

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to bypass authentication on NETGEAR WAC104 wireless access points by adding a specific substring to HTTP queries. Attackers can change the web UI password, enable debug mode with telnet access, and gain shell access as admin, with easy privilege escalation to root due to weak permissions. All NETGEAR WAC104 devices running firmware versions before 1.0.4.15 are affected.

💻 Affected Systems

Products:
  • NETGEAR WAC104 Wireless Access Point
Versions: All firmware versions before 1.0.4.15
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The device must have web management interface accessible (default on LAN).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise with root access, allowing attackers to intercept network traffic, install persistent malware, pivot to other network devices, and maintain persistent access even after password changes.

🟠

Likely Case

Unauthenticated attackers gain admin shell access, change device passwords, enable telnet for persistent access, and potentially intercept or manipulate network traffic passing through the access point.

🟢

If Mitigated

If patched or properly segmented, impact is limited to the device itself without network-wide compromise, though local network access could still be affected.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP access to the device's web interface and adding &currentsetting.htm to any query parameter. No authentication or special tools required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.4.15

Vendor Advisory: https://kb.netgear.com/000063785/Security-Advisory-for-Authentication-Bypass-on-WAC104-PSV-2021-0075

Restart Required: Yes

Instructions:

1. Log into the WAC104 web interface as admin. 2. Navigate to Maintenance > Firmware Upgrade. 3. Download firmware version 1.0.4.15 from NETGEAR support site. 4. Upload and install the firmware. 5. Device will reboot automatically.

🔧 Temporary Workarounds

Disable Web Management Interface

all

Disable the web management interface if not needed for administration

Not applicable - use web interface settings

Network Segmentation

all

Place WAC104 on isolated management VLAN with strict access controls

Not applicable - network configuration required

🧯 If You Can't Patch

  • Isolate the WAC104 on a separate VLAN with strict firewall rules limiting access to trusted management IPs only
  • Disable remote management and ensure web interface is only accessible from internal trusted networks

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface under Maintenance > Router Status. If version is below 1.0.4.15, device is vulnerable.

Check Version:

Not applicable - use web interface or check via HTTP request to device management page

Verify Fix Applied:

Verify firmware version shows 1.0.4.15 or higher in Maintenance > Router Status after update.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing &currentsetting.htm parameter
  • Multiple failed authentication attempts followed by successful admin actions
  • Telnet service activation logs

Network Indicators:

  • HTTP requests to device management interface with unusual query parameters
  • Telnet connections to device on port 23 from unexpected sources
  • Password change requests without prior authentication

SIEM Query:

http.url:*currentsetting.htm* OR event.action:"password change" AND NOT auth.success:true

🔗 References

📤 Share & Export