#alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET DELETED Netgear DGN1000/DGN2200 Unauthenticated Command Execution Inbound"; flow:established,to_server; content:"/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd="; depth:49; http_uri; metadata: former_category EXPLOIT; reference:url,www.exploit-db.com/exploits/25978; classtype:attempted-admin; sid:2029214; rev:1; metadata:affected_product Netgear_Router, attack_target IoT?, deployment Perimeter, signature_severity Minor, created_at 2019_12_31, updated_at 2020_01_02;)

Added 2020-01-02 20:45:23 UTC


alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET EXPLOIT Netgear DGN1000/DGN2200 Unauthenticated Command Execution Inbound"; flow:established,to_server; content:"/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd="; depth:49; http_uri; metadata: former_category EXPLOIT; reference:url,www.exploit-db.com/exploits/25978; classtype:attempted-admin; sid:2029214; rev:1; metadata:affected_product Netgear_Router, attack_target IoT?, deployment Perimeter, signature_severity Minor, created_at 2019_12_31, updated_at 2019_12_31;)

Added 2019-12-31 19:14:18 UTC


Topic revision: r1 - 2020-01-03 - TWikiGuest
 
This site is powered by the TWiki collaboration platform Powered by Perl This site is powered by the TWiki collaboration platformCopyright © Emerging Threats