First published: Mon Mar 02 2020(Updated: )
An issue was discovered on NETGEAR WNR1000V4 1.1.0.54 devices. The web management interface (setup.cgi) has an authentication bypass and other problems that ultimately allow an attacker to remotely compromise the device from a malicious webpage. The attacker sends an FW_remote.htm&todo=cfg_init request without a cookie, reads the Set-Cookie header in the 401 Unauthorized response, and then repeats the FW_remote.htm&todo=cfg_init request with the specified cookie.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Wnr1000 Firmware | =1.1.0.54 | |
Netgear WNR1000 | =4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-20489 is critical with a severity score of 9.8.
The affected software for CVE-2019-20489 is NETGEAR WNR1000V4 firmware version 1.1.0.54.
An attacker can exploit CVE-2019-20489 by using an authentication bypass and other vulnerabilities in the web management interface to remotely compromise the device from a malicious webpage.
No, NETGEAR WNR1000 version 4 is not vulnerable to CVE-2019-20489.
You can find more information about CVE-2019-20489 at the following link: [https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-netgear-wnr1000v4-round-2/](https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-netgear-wnr1000v4-round-2/)