CVE-2024-36795

4.0 MEDIUM

📋 TL;DR

This vulnerability involves insecure permissions in Netgear WNR614 JNR1010V2 routers, allowing attackers to access URLs and directories embedded within the firmware. Attackers can potentially view sensitive information or configuration files. This affects users of specific Netgear router models with vulnerable firmware versions.

💻 Affected Systems

Products:
  • Netgear WNR614 JNR1010V2/N300
Versions: V1.1.0.54_1.0.1
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific firmware version on these router models; other versions may also be vulnerable but unconfirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to sensitive firmware files, potentially leading to credential theft, configuration tampering, or further exploitation of the router.

🟠

Likely Case

Unauthorized access to embedded URLs and directories, exposing configuration details or sensitive information stored in firmware.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though firmware exposure remains a concern.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation likely involves accessing specific URLs or directories without authentication, though exact vectors are unspecified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

Check Netgear support for firmware updates; if unavailable, consider workarounds or replacement.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the router from critical internal networks to limit potential damage.

Access Control Lists

all

Implement firewall rules to restrict access to router management interfaces.

🧯 If You Can't Patch

  • Replace the router with a supported model that receives security updates.
  • Monitor network traffic for unusual access attempts to router URLs.

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface or CLI; if version is V1.1.0.54_1.0.1, it is vulnerable.

Check Version:

Check router web interface under Advanced > Administration > Router Status or similar.

Verify Fix Applied:

Update firmware to a newer version if available and confirm version change.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access logs to router URLs or directories, especially from unauthorized IPs.

Network Indicators:

  • HTTP requests to embedded router paths from unexpected sources.

SIEM Query:

source="router_logs" AND (url_path CONTAINS "/firmware/" OR url_path CONTAINS "/config/")

🔗 References

📤 Share & Export