Jump to content

NetGear WNDR Authentication Bypass Vulnerability


Recommended Posts

Posted

A vulnerability exists in a number of Netgear routers whereby a remote user can bypass authentication.

Known and suspect models can be found on the following site together with details of the vulnerability. http://www.securitytracker.com/id/1031762

See this Wikipedia article for an explanation of SOAP: http://en.wikipedia.org/wiki/SOAP

No fix was available at the time of writing.

Workaround: disable remote / WAN management.

Posted

kristoffer.png

Sound like Netgear needs to hire 5-year-old Kristoffer to do product vulnerability testing.

"At first glance, this service [sOAP / NetGear Genie application ] appears to be filtered and authenticated;
HTTP requests with a `SOAPAction` header set but without a session identifier will yield a HTTP 401 error. However, a HTTP request with a
blank form and a `SOAPAction` header is sufficient to execute certain requests and query information from the device."
Yep, Kristoffer would have found this vulnerability with his 'blank' and 'multiple spaces as a valid entry' routine.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.



×
×
  • Create New...