CVE-2021-44262
📋 TL;DR
This vulnerability allows remote attackers to access the 'MNU_top.htm' page on Netgear WAC104 access points without authentication, exposing sensitive device information. It affects Netgear WAC104 access points running vulnerable firmware versions. Attackers can exploit this to gather intelligence for further attacks.
💻 Affected Systems
- Netgear WAC104 Wireless Access Point
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers obtain sensitive device information that enables credential theft, configuration manipulation, or serves as reconnaissance for more severe attacks like remote code execution.
Likely Case
Unauthorized access to device information leading to network reconnaissance, potential credential exposure, and privacy violations.
If Mitigated
Limited impact with proper network segmentation and access controls preventing external access to management interfaces.
🎯 Exploit Status
Simple HTTP request to vulnerable endpoint without authentication required; proof-of-concept available in GitHub repository.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Netgear security advisory for latest patched version
Vendor Advisory: https://www.netgear.com/about/security/
Restart Required: Yes
Instructions:
1. Log into Netgear support portal. 2. Download latest firmware for WAC104. 3. Access device web interface. 4. Navigate to Administration > Firmware Upgrade. 5. Upload and apply new firmware. 6. Reboot device.
🔧 Temporary Workarounds
Network Segmentation
allIsolate management interface from untrusted networks
Access Control Lists
linuxRestrict access to device management IP/port to trusted IPs only
iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to isolate device from untrusted networks
- Deploy web application firewall rules to block access to /MNU_top.htm
🔍 How to Verify
Check if Vulnerable:
Attempt HTTP GET request to http://device_ip/MNU_top.htm without authentication; if page loads with device information, device is vulnerable.
Check Version:
Check web interface status page or use: curl -s http://device_ip/ | grep -i firmware
Verify Fix Applied:
After patching, attempt same HTTP request; should receive authentication prompt or error instead of device information.
📡 Detection & Monitoring
Log Indicators:
- HTTP GET requests to /MNU_top.htm from unauthorized IPs
- Access logs showing successful 200 responses to this endpoint without prior authentication
Network Indicators:
- Unusual HTTP traffic to device management port (typically 80/443) from external IPs
- Pattern of requests to sensitive endpoints without authentication
SIEM Query:
source="device_logs" AND url="/MNU_top.htm" AND response_code=200 AND NOT user_agent="monitoring_tool"
🔗 References
- https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_W104_unauthorized_access_vulnerability_second.md
- https://www.netgear.com/about/security/
- https://github.com/zer0yu/CVE_Request/blob/master/netgear/Netgear_W104_unauthorized_access_vulnerability_second.md
- https://www.netgear.com/about/security/