CVE-2021-44262

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to access the 'MNU_top.htm' page on Netgear WAC104 access points without authentication, exposing sensitive device information. It affects Netgear WAC104 access points running vulnerable firmware versions. Attackers can exploit this to gather intelligence for further attacks.

💻 Affected Systems

Products:
  • Netgear WAC104 Wireless Access Point
Versions: WAC104-V1.0.4.13 (specific version mentioned in CVE)
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific firmware version mentioned; other versions may also be vulnerable but not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain sensitive device information that enables credential theft, configuration manipulation, or serves as reconnaissance for more severe attacks like remote code execution.

🟠

Likely Case

Unauthorized access to device information leading to network reconnaissance, potential credential exposure, and privacy violations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to management interfaces.

🌐 Internet-Facing: HIGH - Directly accessible from internet if management interface is exposed, allowing unauthenticated information disclosure.
🏢 Internal Only: MEDIUM - Still vulnerable to internal attackers or compromised devices, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to vulnerable endpoint without authentication required; proof-of-concept available in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Netgear security advisory for latest patched version

Vendor Advisory: https://www.netgear.com/about/security/

Restart Required: Yes

Instructions:

1. Log into Netgear support portal. 2. Download latest firmware for WAC104. 3. Access device web interface. 4. Navigate to Administration > Firmware Upgrade. 5. Upload and apply new firmware. 6. Reboot device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate management interface from untrusted networks

Access Control Lists

linux

Restrict access to device management IP/port to trusted IPs only

iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate device from untrusted networks
  • Deploy web application firewall rules to block access to /MNU_top.htm

🔍 How to Verify

Check if Vulnerable:

Attempt HTTP GET request to http://device_ip/MNU_top.htm without authentication; if page loads with device information, device is vulnerable.

Check Version:

Check web interface status page or use: curl -s http://device_ip/ | grep -i firmware

Verify Fix Applied:

After patching, attempt same HTTP request; should receive authentication prompt or error instead of device information.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /MNU_top.htm from unauthorized IPs
  • Access logs showing successful 200 responses to this endpoint without prior authentication

Network Indicators:

  • Unusual HTTP traffic to device management port (typically 80/443) from external IPs
  • Pattern of requests to sensitive endpoints without authentication

SIEM Query:

source="device_logs" AND url="/MNU_top.htm" AND response_code=200 AND NOT user_agent="monitoring_tool"

🔗 References

📤 Share & Export