CVE-2024-36792

8.2 HIGH

📋 TL;DR

This vulnerability in Netgear WNR614 routers allows attackers to obtain the WPS PIN through implementation flaws in the Wi-Fi Protected Setup feature. Attackers within wireless range can exploit this to gain unauthorized access to the router's network. Users of Netgear WNR614 JNR1010V2 routers with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Netgear WNR614 JNR1010V2
Versions: N300-V1.1.0.54_1.0.1
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the WPS implementation; routers with WPS enabled are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the wireless network, allowing attackers to intercept traffic, perform man-in-the-middle attacks, and potentially access connected devices.

🟠

Likely Case

Unauthorized network access leading to bandwidth theft, network reconnaissance, and potential lateral movement to connected devices.

🟢

If Mitigated

Limited impact if WPS is disabled and strong WPA2/WPA3 encryption is used with a complex passphrase.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires proximity to wireless signal; tools like Reaver or Bully can automate exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check Netgear support site for firmware updates, but this model may be end-of-life.

🔧 Temporary Workarounds

Disable WPS

all

Turn off Wi-Fi Protected Setup in router administration interface

Use WPA2/WPA3 with strong passphrase

all

Enable WPA2 or WPA3 encryption with a complex, random passphrase (minimum 12 characters)

🧯 If You Can't Patch

  • Replace router with supported model that receives security updates
  • Segment network: place vulnerable router behind firewall or in isolated network segment

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface. If version is N300-V1.1.0.54_1.0.1 and WPS is enabled, you are vulnerable.

Check Version:

Login to router admin interface (typically 192.168.1.1 or 192.168.0.1) and check firmware version in settings.

Verify Fix Applied:

Verify WPS is disabled in router settings and strong WPA2/WPA3 encryption is enabled.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed WPS connection attempts
  • Unusual WPS PIN authentication events

Network Indicators:

  • WPS brute-force traffic patterns
  • Unexpected devices connecting via WPS

SIEM Query:

Not applicable for typical home router deployments

🔗 References

📤 Share & Export