CVE-2024-36789

8.1 HIGH

📋 TL;DR

This vulnerability in Netgear WNR614 routers allows attackers to set passwords that bypass the device's security policy requirements. Attackers could potentially gain unauthorized access to router administration interfaces. Users of affected Netgear router models with vulnerable firmware are impacted.

💻 Affected Systems

Products:
  • Netgear WNR614 JNR1010V2/N300
Versions: V1.1.0.54_1.0.1
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific firmware version on these router models. Default configuration is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the router, enabling them to reconfigure network settings, intercept traffic, or use the router as an attack platform.

🟠

Likely Case

Local network attackers or malicious insiders set weak passwords that violate security policies, potentially compromising router security.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the local network segment.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the router's administration interface. The vulnerability is documented in public security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Check Netgear support for firmware updates. 2. If update available, download from official Netgear site. 3. Access router admin interface. 4. Upload and apply firmware update. 5. Verify new firmware version.

🔧 Temporary Workarounds

Enforce Strong Password Policy

all

Manually enforce strong password requirements for router administration accounts

Restrict Administrative Access

all

Limit router administration interface access to specific trusted IP addresses

🧯 If You Can't Patch

  • Replace affected routers with supported models that receive security updates
  • Implement network segmentation to isolate router management traffic

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is V1.1.0.54_1.0.1 on Netgear WNR614 JNR1010V2/N300, device is vulnerable.

Check Version:

Access router web interface at 192.168.1.1 or routerlogin.net and check firmware version in Advanced > Administration > Router Update

Verify Fix Applied:

Verify firmware version has been updated to a version newer than V1.1.0.54_1.0.1

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts with non-compliant passwords
  • Successful logins from unexpected IP addresses

Network Indicators:

  • Unusual administrative access patterns to router management interface

SIEM Query:

source="router.log" AND (event="login" OR event="authentication") AND result="success" AND user="admin"

🔗 References

📤 Share & Export