CrowdSec
0/10CrowdSec Score

Netgear DGN1000/DGN220 - RCE (CVE-2024-12847)

Published on10-01-2025
First seen on14-06-2023

58111Exploiting IPs reported

NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been exploited in the wild since at least 2017.

CrowdSec analysis

CVE-2024-12847, a vulnerability in NETGEAR DGN1000 allows unauthenticated attacker to execute arbitrary commands. Attackers can exploit this flaw by sending crafted HTTP request, potentially leading to full system compromise and unauthorized execution of arbitrary code on the affected server. Although public descriptions of this exploit have existed since 2013, it was ultimately assigned a CVE number in 2024. Before this, the exploit was simply known as the Netgear setup.cgi exploit and was mainly used to build botnets.

CrowdSec has been tracking this vulnerability and its exploits since 14th of June 2023.

Based on data from the CrowdSec network, nearly all observed exploitation of CVE-2024-12847 is fully opportunistic, with attackers indiscriminately scanning the entire internet. These attacks are automated and lack any form of target selection or reconnaissance. CrowdSec network telemetry also shows that exploitation of CVE-2024-12847 has significantly declined over the past week. Attack volumes are well below the long-term average, suggesting attackers are rapidly losing interest. The vulnerability appears to be falling out of active use across most threat landscapes.

Attackers exploit NETGEAR DGN1000 by sending crafted HTTP requests to the setup.cgi endpoint to achieve remote code execution.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.