CVE-2013-10061
Severity CVSS v4.0:
HIGH
Type:
CWE-78
OS Command Injections
Publication date:
01/08/2025
Last modified:
23/09/2025
Description
An authenticated OS command injection vulnerability exists in Netgear routers (tested on the DGN1000B model firmware versions 1.1.00.24 and 1.1.00.45) via the TimeToLive parameter in the setup.cgi endpoint. The vulnerability arises from improper input neutralization, enabling command injection through crafted POST requests. This flaw enables remote attackers to deploy payloads or manipulate system state post-authentication.
Impact
Base Score 4.0
8.60
Severity 4.0
HIGH
Base Score 3.x
7.20
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:netgear:dgn1000b_firmware:1.1.00.24:*:*:*:*:*:*:* | ||
| cpe:2.3:o:netgear:dgn1000b_firmware:1.1.00.45:*:*:*:*:*:*:* | ||
| cpe:2.3:h:netgear:dgn1000b:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb
- https://web.archive.org/web/20150218074318/http://www.s3cur1ty.de/m1adv2013-005
- https://www.exploit-db.com/exploits/24464
- https://www.exploit-db.com/exploits/24931
- https://www.vulncheck.com/advisories/netgear-legacy-routers-rce-2
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb
- https://web.archive.org/web/20150218074318/http://www.s3cur1ty.de/m1adv2013-005
- https://www.exploit-db.com/exploits/24464
- https://www.exploit-db.com/exploits/24931



