exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Netgear WNDRMAC Information Disclosure

Netgear WNDRMAC Information Disclosure
Posted May 13, 2012
Authored by Nathaniel Carew | Site senseofsecurity.com.au

Netgear WNDRMAC versions and below suffer from a serial number disclosure vulnerability.

tags | exploit, web
SHA-256 | 664bd8ae2a0cd1c838915a72e05bf722f27b543f881fd63debb15589291aab4c

Netgear WNDRMAC Information Disclosure

Change Mirror Download
Sense of Security - Security Advisory - SOS-12-005

Release Date. 13-May-2012
Last Update. -
Vendor Notification Date. 06-Mar-2012
Platform. Hardware
Affected versions. and below
Severity Rating. High
Impact. Exposure of sensitive information
Attack Vector. From remote without authentication
Solution Status. Currently no software update; the
vulnerable functionality can be disabled
CVE reference. CVE - not yet assigned

The NETGEAR Wireless Extreme for Mac computer and PCs (WNDRMAC)
is a N600 wireless dual-band gigabit router. The router
discloses sensitive information in the page source, if a
previous password recovery has been successfully completed,
which allows an attacker to login to the device.

Proof of Concept.
Viewing the source code of the page you are presented with when
you fail to login successfully with the administrator account
exposes the routers serial number which is required to get to the
recovery questions section.

<HTML><HEAD><LINK rel="stylesheet" href="/style/form.css">
<TITLE> 401 Authorization</TITLE>
<META http-equiv=content-type content='text/html; charset=UTF-8'>
function loadvalue()
var enable_recovery="1";
var enter_sn_again="0";
var last_error_sn="2T82195D0093D";
if( enable_recovery == "1" )

Viewing the source code of the recovery questions page allows an
attacker to view the answers to the password recovery questions.
After submitting these answers you are presented with the current
administrator credentials.

<TITLE> Router Password Recovery</TITLE>
<META http-equiv=content-type content='text/html; charset=UTF-8'>
<LINK rel="stylesheet" href="/style/form.css">
var quest1_1="What was the name of the first NETGEAR product you
var quest1_2="What was the name of the first school you attended?";
function loadvalue()
var answer_again="1";
var last_error_ans1="Answer one";
var last_error_ans2="Answer two";

Disable the password recovery option.

Discovered by.
Nathaniel Carew from Sense of Security Labs.

About us.
Sense of Security is a leading provider of information security and
risk management solutions. Our team has expert skills in assessment
and assurance, strategy and architecture, and deployment through to
ongoing management. We are Australia's premier application penetration
testing firm and trusted IT security advisor to many of the country's
largest organisations.

Sense of Security Pty Ltd
Level 8, 66 King St
Sydney NSW 2000

T: +61 (0)2 9290 4444
F: +61 (0)2 9290 4455
W: http://www.senseofsecurity.com.au
E: info@senseofsecurity.com.au
Twitter: @ITsecurityAU

The latest version of this advisory can be found at:

Other Sense of Security advisories can be found at:

Login or Register to add favorites

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By