CVE-2024-54806
📋 TL;DR
CVE-2024-54806 allows remote attackers to execute arbitrary system commands on Netgear WNR854T routers through the cmd.cgi web interface. This affects Netgear WNR854T routers running firmware version 1.5.2 in North America. Attackers can gain complete control of affected devices.
💻 Affected Systems
- Netgear WNR854T
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of router allowing attackers to intercept all network traffic, install persistent malware, pivot to internal network devices, and use router as botnet node.
Likely Case
Router takeover leading to DNS hijacking, credential theft from network traffic, and installation of cryptocurrency miners or other malware.
If Mitigated
Limited impact if router is isolated from internet and internal network, though local network compromise remains possible.
🎯 Exploit Status
Exploitation requires web interface access but no authentication. Simple HTTP requests can trigger command execution.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Netgear WNR854T is end-of-life and no longer supported. Consider replacement with supported router.
🔧 Temporary Workarounds
Disable web interface remote access
allPrevent external access to router web interface
Login to router admin > Advanced > Remote Management > Disable
Change default admin password
allUse strong unique password for router admin
Login to router admin > Advanced > Administration > Set Password
🧯 If You Can't Patch
- Replace router with supported model
- Isolate router in separate VLAN with strict firewall rules
🔍 How to Verify
Check if Vulnerable:
Check router firmware version in admin interface: Advanced > Administration > Router Status > Firmware Version
Check Version:
curl -s http://router-ip/ | grep -i firmware
Verify Fix Applied:
No fix available to verify. Workarounds can be verified by testing web interface accessibility.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /cmd.cgi
- Multiple failed login attempts followed by cmd.cgi access
- Router logs showing command execution
Network Indicators:
- HTTP requests to router IP with cmd.cgi parameters
- Outbound connections from router to suspicious IPs
- DNS queries to malicious domains from router
SIEM Query:
source="router.log" AND (uri="/cmd.cgi" OR method="POST" AND uri="/")