The administrative web interface on the Netgear DG632 with firmware 3.4.0_ap allows remote attackers to bypass authentication via a direct request to (1) gateway/commands/saveconfig.html, and (2) stattbl.htm, (3) modemmenu.htm, (4) onload.htm, (5) form.css, (6) utility.js, and possibly (7) indextop.htm in html/.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.tomneaves.co.uk/Netgear_DG632_Authentication_Bypass.txt | exploit |
http://www.securityfocus.com/archive/1/504312/100/0/threaded | mailing list |
http://www.exploit-db.com/exploits/8963 | exploit |
http://securitytracker.com/id?1022404 | vdb entry exploit |