Skip to main content

CVE-2025-4977: Information Disclosure in Netgear DGND3700

Medium
VulnerabilityCVE-2025-4977cvecve-2025-4977
Published: Tue May 20 2025 (05/20/2025, 13:00:06 UTC)
Source: CVE
Vendor/Project: Netgear
Product: DGND3700

Description

A vulnerability, which was classified as problematic, has been found in Netgear DGND3700 1.1.00.15_1.00.15NA. Affected by this issue is some unknown functionality of the file /BRS_top.html. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other products might be affected as well. The vendor was contacted early about this disclosure.

AI-Powered Analysis

AILast updated: 07/11/2025, 13:19:21 UTC

Technical Analysis

CVE-2025-4977 is an information disclosure vulnerability identified in the Netgear DGND3700 router, specifically version 1.1.00.15_1.00.15NA. The vulnerability arises from an issue in the /BRS_top.html file, where certain manipulations can lead to unauthorized disclosure of information. This flaw can be exploited remotely without requiring any authentication or user interaction, making it accessible to attackers over the network. The vulnerability has been classified as 'problematic' with a CVSS 4.0 base score of 6.9, indicating a medium severity level. The CVSS vector details that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and only a low impact on confidentiality (VC:L). There is no impact on integrity or availability. The vendor, Netgear, was notified early about the issue, but no patch links are currently available, and no known exploits are reported in the wild. Although the disclosed vulnerability specifically affects the DGND3700 model, other Netgear products might also be vulnerable due to shared codebases or similar firmware components. The vulnerability allows attackers to remotely access sensitive information that could potentially aid in further attacks or reconnaissance, such as configuration details or internal device data exposed via the affected HTML file.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily in environments where the Netgear DGND3700 router is deployed, such as small to medium-sized enterprises or home office setups. Information disclosure can lead to leakage of sensitive network configuration or device information, which attackers could leverage to mount more targeted attacks, including network intrusion or lateral movement. While the direct impact on confidentiality is low, the exposure of internal device details can undermine network security posture. Given that the vulnerability requires no authentication and can be exploited remotely, attackers can scan and target vulnerable devices across the internet or internal networks. This is particularly concerning for organizations with less mature network segmentation or those relying on consumer-grade networking equipment. The absence of known exploits in the wild reduces immediate risk, but public disclosure increases the likelihood of future exploitation attempts. The lack of a patch at the time of disclosure means organizations must rely on interim mitigations to reduce exposure. Overall, the threat is moderate but should be addressed promptly to prevent escalation.

Mitigation Recommendations

1. Immediate network-level controls: Restrict remote access to the affected router's management interface by implementing firewall rules that limit access to trusted IP addresses or internal networks only. 2. Disable remote management features on the DGND3700 router if enabled, to reduce exposure to external attackers. 3. Monitor network traffic for unusual requests targeting /BRS_top.html or other suspicious HTTP requests to the router's web interface. 4. Segment networks to isolate vulnerable devices from critical infrastructure and sensitive data repositories, limiting the potential impact of any compromise. 5. Regularly audit and inventory networking hardware to identify devices running the affected firmware version. 6. Engage with Netgear support channels to obtain information on patches or firmware updates addressing this vulnerability and plan timely updates once available. 7. Consider replacing vulnerable consumer-grade routers with enterprise-grade devices that receive timely security updates and offer enhanced security features. 8. Educate IT staff about the vulnerability and encourage proactive vulnerability management practices, including monitoring vendor advisories and applying patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-20T06:02:37.499Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeafed

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/11/2025, 1:19:21 PM

Last updated: 8/9/2025, 6:50:13 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats