Files
zira-etc/crowdsec/hub/scenarios/crowdsecurity/netgear_rce.yaml

21 lines
602 B
YAML

type: trigger
format: 2.0
name: crowdsecurity/netgear_rce
description: "Detect Netgear RCE DGN1000/DGN220 exploitation attempts"
filter: |
evt.Meta.log_type in ['http_access-log', 'http_error-log'] && Lower(QueryUnescape(evt.Meta.http_path)) startsWith Lower('/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=')
groupby: "evt.Meta.source_ip"
blackhole: 2m
references:
- "https://www.exploit-db.com/exploits/25978"
labels:
confidence: 3
spoofable: 0
classification:
- attack.T1595
- attack.T1190
behavior: "http:exploit"
label: "Netgear RCE"
service: netgear
remediation: true