Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12847: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NETGEAR DGN1000

0
Critical
VulnerabilityCVE-2024-12847cvecve-2024-12847cwe-78cwe-306
Published: Fri Jan 10 2025 (01/10/2025, 19:36:36 UTC)
Source: CVE Database V5
Vendor/Project: NETGEAR
Product: DGN1000

Description

NETGEAR DGN1000 before 1.1.00.48 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can execute arbitrary operating system commands as root by sending crafted HTTP requests to the setup.cgi endpoint. This vulnerability has been observed to be exploited in the wild since at least 2017 and specifically by the Shadowserver Foundation on 2025-02-06 UTC.

AI-Powered Analysis

AILast updated: 12/19/2025, 20:50:43 UTC

Technical Analysis

CVE-2024-12847 is a critical vulnerability affecting the NETGEAR DGN1000 router firmware versions prior to 1.1.00.48. The flaw is an OS command injection (CWE-78) combined with an authentication bypass (CWE-306), allowing a remote attacker to send specially crafted HTTP requests to the setup.cgi endpoint and execute arbitrary operating system commands with root privileges. This means an attacker can fully compromise the device without any authentication or user interaction. The vulnerability has been exploited in the wild since at least 2017, indicating long-term exposure and active targeting. The root cause lies in improper input validation and sanitization of parameters passed to OS commands within the router’s web management interface. The CVSS v3.1 score of 9.8 reflects the vulnerability’s ease of exploitation (network vector, no privileges or interaction required) and its severe impact on confidentiality, integrity, and availability. The router’s role as a network gateway means exploitation can lead to full network compromise, interception or manipulation of traffic, and persistent backdoors. Despite no official patch links provided in the data, the fixed firmware version is 1.1.00.48 or later. The Shadowserver Foundation’s detection of exploitation in 2025 confirms ongoing active threats. This vulnerability is particularly dangerous because it allows attackers to bypass authentication entirely, making traditional credential protections ineffective.

Potential Impact

For European organizations, the impact of CVE-2024-12847 is substantial. The NETGEAR DGN1000 is commonly deployed in small to medium enterprises and home office environments, often serving as the primary internet gateway. Exploitation can lead to full device takeover, enabling attackers to intercept sensitive communications, launch further attacks within internal networks, or disrupt availability by disabling network services. Confidential data such as credentials, business communications, and proprietary information could be exposed or manipulated. The ability to execute commands as root means attackers can install persistent malware or pivot to other critical infrastructure components. Given the long exploitation history, organizations may already be compromised without detection. This vulnerability also poses risks to critical infrastructure sectors that rely on such routers for connectivity, including healthcare, finance, and government agencies. The unauthenticated nature of the exploit increases the attack surface, making it easier for cybercriminals and state-sponsored actors to target European networks remotely.

Mitigation Recommendations

1. Immediately upgrade all NETGEAR DGN1000 routers to firmware version 1.1.00.48 or later, which addresses this vulnerability. 2. If firmware upgrade is not immediately possible, restrict access to the router’s management interface by limiting it to trusted internal IP addresses and disabling remote management features. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data. 4. Monitor network traffic for unusual HTTP requests targeting setup.cgi or other suspicious patterns indicative of exploitation attempts. 5. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability or custom rules to detect command injection attempts. 6. Conduct regular vulnerability scans and penetration tests focusing on network gateways to identify and remediate similar issues. 7. Educate IT staff and users about the risks of using outdated firmware and the importance of timely patching. 8. Consider replacing legacy devices with modern routers that receive regular security updates and support stronger authentication mechanisms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2024-12-20T14:49:29.976Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f8f1bb342c1dca41c33d7

Added to database: 11/20/2025, 9:58:51 PM

Last enriched: 12/19/2025, 8:50:43 PM

Last updated: 1/7/2026, 8:57:42 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats