CrowdSec
6/10CrowdSec Score

Netgear DGN1000/DGN220 - RCE (CVE-2024-12847)

Published on10-01-2025
First seen on14-06-2023

58935Exploiting IPs reported

NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been exploited in the wild since at least 2017.

CrowdSec analysis

CVE-2024-12847, a vulnerability in NETGEAR DGN1000 allows unauthenticated attacker to execute arbitrary commands. Attackers can exploit this flaw by sending crafted HTTP request, potentially leading to full system compromise and unauthorized execution of arbitrary code on the affected server. Although public descriptions of this exploit have existed since 2013, it was ultimately assigned a CVE number in 2024. Before this, the exploit was simply known as the Netgear setup.cgi exploit and was mainly used to build botnets.

CrowdSec has been tracking this vulnerability and its exploits since 14th of June 2023.

CrowdSec network data shows that most actors exploiting CVE-2024-12847 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2024-12847 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2024-12847 is currently experiencing high visibility and active exploitation across the internet.

Attackers exploit NETGEAR DGN1000 by sending crafted HTTP requests to the setup.cgi endpoint to achieve remote code execution.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.