CVE-2024-6646

5.3 MEDIUM

📋 TL;DR

This vulnerability in Netgear WN604 wireless access points allows remote attackers to access sensitive configuration files through the /downloadFile.php web interface. Attackers can exploit this to obtain device configuration information without authentication. All Netgear WN604 devices with the vulnerable web interface are affected.

💻 Affected Systems

Products:
  • Netgear WN604 Wireless Access Point
Versions: All versions up to 20240710
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with web interface enabled are vulnerable. The vulnerability exists in the default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain full device configuration including network settings, credentials, and security parameters, potentially enabling further attacks on the network.

🟠

Likely Case

Attackers access configuration files containing network settings and device information, facilitating reconnaissance for follow-up attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to information disclosure without direct access to critical systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub. Attack requires only web access to the device interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor was contacted but did not respond. Consider workarounds or device replacement.

🔧 Temporary Workarounds

Disable Web Interface

all

Disable the web management interface if not required for operation

Access device CLI via SSH/Telnet
Disable web interface in configuration

Network Access Control

linux

Restrict access to device management interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Segment affected devices on isolated network VLAN
  • Implement strict firewall rules to block external access to device management interface

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://device-ip/downloadFile.php?file=config and check if configuration file is returned

Check Version:

Check device web interface or CLI for firmware version information

Verify Fix Applied:

Verify web interface is disabled or inaccessible from untrusted networks

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /downloadFile.php with file=config parameter
  • Unusual access to configuration files

Network Indicators:

  • External IP addresses accessing device management interface
  • Traffic to downloadFile.php endpoint

SIEM Query:

source_ip=* AND url_path="/downloadFile.php" AND query_string="*file=config*"

🔗 References

📤 Share & Export