CVE-2024-30568 Scanner
Detects 'Command Injection' vulnerability in Netgear R6850 Router affects v. V1.1.0.88.
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
6 days 6 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
Netgear R6850 is a widely used wireless router designed for home and small office networks. It provides high-speed internet access, advanced security features, and multiple connectivity options. The router supports dual-band Wi-Fi and is known for its user-friendly interface. Many users rely on Netgear R6850 for stable and secure internet connections. Network administrators use this device for managing home and business networks efficiently. The router is part of Netgear’s extensive range of consumer and enterprise networking solutions.
Command injection is a critical security vulnerability that allows attackers to execute arbitrary system commands on a target device. This flaw occurs when user input is improperly sanitized before being used in command execution functions. In the case of Netgear R6850, the vulnerability exists in the ping_test functionality. Attackers can exploit this flaw by injecting malicious commands through the c4_IPAddr parameter. Successful exploitation can lead to remote code execution with root privileges. This poses a severe risk to the security and integrity of the affected system.
The vulnerability resides in the router’s diagnostic function, specifically the ping_test feature. The c4_IPAddr parameter fails to validate user input, allowing attackers to append arbitrary commands. By sending a specially crafted HTTP POST request, an unauthenticated attacker can execute system commands remotely. This issue enables attackers to gain full control over the device. The exploitation can be confirmed using an out-of-band interaction mechanism such as DNS or HTTP callbacks. The lack of input sanitization in the firmware makes the router susceptible to this attack.
If exploited, the command injection vulnerability in Netgear R6850 can have severe consequences. Attackers can gain root-level access, allowing them to install malware, modify configurations, or exfiltrate sensitive data. The compromised router can be used to launch further attacks on internal networks. Unauthorized remote access may lead to denial of service or permanent damage to the device. The vulnerability also increases the risk of botnet infections and mass exploitation by cybercriminals. Ultimately, users may experience data breaches, service disruptions, and financial losses.
REFERENCES