Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3

0
High
VulnerabilityCVE-2024-23690cvecve-2024-23690cwe-78
Published: Tue Feb 04 2025 (02/04/2025, 14:34:00 UTC)
Source: CVE Database V5
Vendor/Project: Netgear
Product: FVS336Gv3

Description

The end-of-life Netgear FVS336Gv2 and FVS336Gv3 are affected by a command injection vulnerability in the Telnet interface. An authenticated and remote attacker can execute arbitrary OS commands as root over Telnet by sending crafted "util backup_configuration" commands.

AI-Powered Analysis

AILast updated: 11/22/2025, 12:44:44 UTC

Technical Analysis

CVE-2024-23690 is an OS command injection vulnerability classified under CWE-78, found in the Telnet interface of Netgear FVS336Gv2 and FVS336Gv3 routers, which are now end-of-life products. The vulnerability arises from improper neutralization of special elements in the 'util backup_configuration' command, allowing an authenticated remote attacker to inject arbitrary OS commands executed with root privileges. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but does require high-level privileges (PR:H) and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Exploitation involves connecting to the device's Telnet service and sending crafted commands to execute arbitrary shell commands, potentially leading to full device compromise, data exfiltration, or disruption of network services. No public exploits or patches are currently available, increasing the risk for organizations continuing to use these devices. The vulnerability is particularly critical because the devices are often used as VPN gateways or firewalls in small to medium business environments, making them attractive targets for attackers seeking network footholds. The lack of patch availability and the end-of-life status of the devices complicate remediation efforts.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security, especially for those still operating legacy Netgear FVS336Gv2 or FVS336Gv3 routers. Successful exploitation can lead to complete device takeover, allowing attackers to intercept, modify, or disrupt network traffic, potentially compromising sensitive data and internal systems. The high impact on confidentiality, integrity, and availability could disrupt business operations, cause data breaches, or enable lateral movement within corporate networks. Critical sectors such as finance, healthcare, and government agencies using these devices for VPN or firewall functions are particularly vulnerable. The absence of patches means organizations must rely on network-level mitigations or device replacement, increasing operational costs and complexity. The requirement for authentication limits the attack surface but does not eliminate risk, as credential compromise or insider threats could facilitate exploitation. Additionally, the use of Telnet, an insecure protocol, exacerbates the risk of credential interception and unauthorized access.

Mitigation Recommendations

1. Immediately disable Telnet access on all Netgear FVS336Gv2 and FVS336Gv3 devices to eliminate the remote attack vector. 2. Restrict administrative access to these devices to trusted management networks using firewall rules or VPNs. 3. Replace affected devices with currently supported and patched models to ensure ongoing security updates. 4. Implement strong authentication mechanisms and regularly rotate credentials to reduce the risk of credential compromise. 5. Monitor network traffic for unusual Telnet connections or command patterns indicative of exploitation attempts. 6. If device replacement is not immediately feasible, isolate the devices from critical network segments to limit potential impact. 7. Educate network administrators about the risks of using end-of-life devices and insecure protocols like Telnet. 8. Consider deploying network intrusion detection systems (NIDS) with signatures to detect exploitation attempts targeting this vulnerability. 9. Maintain an inventory of all network devices to identify and prioritize remediation of vulnerable hardware. 10. Engage with Netgear support or authorized vendors for any potential firmware updates or workarounds, despite the end-of-life status.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2024-01-19T17:35:14.201Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6921acbf8e780dcd644b6535

Added to database: 11/22/2025, 12:29:51 PM

Last enriched: 11/22/2025, 12:44:44 PM

Last updated: 11/22/2025, 1:53:57 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats