Home

Description

An authentication bypass vulnerability in NETGEAR Orbi devices allows users connected to the local network to access the router web interface as an admin.

PUBLISHED Reserved 2025-12-03 | Published 2026-01-13 | Updated 2026-01-14 | Assigner NETGEAR




MEDIUM: 6.1CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber

Problem types

CWE-287 Improper Authentication

Product status

Default status
unaffected

Any version before v9.13.2.1
affected

Default status
unaffected

Any version before v9.13.2.1
affected

Default status
unaffected

Any version before V4.6.14.8
affected

Default status
unaffected

Any version before V4.6.15.14
affected

Default status
unaffected

Any version before v10.5.20.7
affected

Default status
unaffected

Any version before v10.5.20.7
affected

Default status
unaffected

Any version before v10.5.20.7
affected

Default status
unaffected

Any version before v10.5.20.7
affected

Default status
unaffected

Any version before v7.2.8.2
affected

Default status
unaffected

Any version before v7.2.8.2
affected

Default status
unaffected

Any version before v7.2.8.2
affected

Default status
unaffected

Any version before v7.2.8.2
affected

Default status
unaffected

Any version before v7.2.8.2
affected

Default status
unaffected

Any version before v7.2.8.2
affected

Default status
unaffected

Any version before v7.2.8.2
affected

Default status
unaffected

Any version before v7.2.8.2
affected

Default status
unaffected

Any version before v7.2.8.2
affected

Default status
unaffected

Any version before v7.2.8.2
affected

Default status
unaffected

Any version before v7.2.8.2
affected

Default status
unaffected

Any version before v7.2.8.2
affected

Default status
unaffected

Any version before v12.1.3.11
affected

Default status
unaffected

Any version before v12.1.3.11
affected

Default status
unaffected

Any version before v12.1.3.11
affected

Default status
unaffected

Any version before v12.1.3.11
affected

Default status
unaffected

Any version before v12.1.3.11
affected

Credits

Fulaige finder

References

www.netgear.com/support/product/rbe971 patch product

www.netgear.com/support/product/rbe970 patch product

www.netgear.com/support/product/cbr750 patch product

www.netgear.com/support/product/nbr750 patch product

www.netgear.com/support/product/rbe770 patch product

www.netgear.com/support/product/rbe771 patch product

www.netgear.com/support/product/rbe772 patch product

www.netgear.com/support/product/rbe773 patch product

www.netgear.com/support/product/rbr750 patch product

www.netgear.com/support/product/rbs750 patch product

www.netgear.com/support/product/rbr840 patch product

www.netgear.com/support/product/rbs840 patch product

www.netgear.com/support/product/rbr850 patch product

www.netgear.com/support/product/rbs850 patch product

www.netgear.com/support/product/rbr860 patch product

www.netgear.com/support/product/rbs860 patch product

www.netgear.com/support/product/rbre950 patch product

www.netgear.com/support/product/rbse950 patch product

www.netgear.com/support/product/rbre960 patch product

www.netgear.com/support/product/rbse960 patch product

www.netgear.com/support/product/rbe370 patch product

www.netgear.com/support/product/rbe371 patch product

www.netgear.com/support/product/rbe372 patch product

www.netgear.com/support/product/rbe373 patch product

www.netgear.com/support/product/rbe374 patch product

kb.netgear.com/...442/January-2026-NETGEAR-Security-Advisory vendor-advisory

cve.org (CVE-2026-0405)

nvd.nist.gov (CVE-2026-0405)

Download JSON