Netgear DGN1000/DGN220 - RCE (CVE-2024-12847)
58111Exploiting IPs reported
NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been exploited in the wild since at least 2017.
CrowdSec analysis
CVE-2024-12847, a vulnerability in NETGEAR DGN1000 allows unauthenticated attacker to execute arbitrary commands. Attackers can exploit this flaw by sending crafted HTTP request, potentially leading to full system compromise and unauthorized execution of arbitrary code on the affected server. Although public descriptions of this exploit have existed since 2013, it was ultimately assigned a CVE number in 2024. Before this, the exploit was simply known as the Netgear setup.cgi exploit and was mainly used to build botnets.
CrowdSec has been tracking this vulnerability and its exploits since 14th of June 2023.
Based on data from the CrowdSec network, nearly all observed exploitation of CVE-2024-12847 is fully opportunistic, with attackers indiscriminately scanning the entire internet. These attacks are automated and lack any form of target selection or reconnaissance. CrowdSec network telemetry also shows that exploitation of CVE-2024-12847 has significantly declined over the past week. Attack volumes are well below the long-term average, suggesting attackers are rapidly losing interest. The vulnerability appears to be falling out of active use across most threat landscapes.
Attackers exploit NETGEAR DGN1000 by sending crafted HTTP requests to the setup.cgi endpoint to achieve remote code execution.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.