Home

Description

A path traversal vulnerability in NETGEAR WiFi range extenders allows an attacker with LAN authentication to access the router's IP and review the contents of the dynamically generated webproc file, which records the username and password submitted to the router GUI.

PUBLISHED Reserved 2025-12-03 | Published 2026-01-13 | Updated 2026-01-14 | Assigner NETGEAR




MEDIUM: 6.1CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber

Problem types

CWE-287 Improper Authentication

Product status

Default status
unaffected

Any version before v1.0.1.82
affected

Default status
unaffected

Any version before v1.0.1.82
affected

Default status
unaffected

Any version before v1.0.1.82
affected

Default status
unaffected

Any version before v1.0.1.82
affected

Credits

chiphazard finder

References

www.netgear.com/support/product/ex5000 product patch

www.netgear.com/support/product/ex3110 product patch

www.netgear.com/support/product/ex6110 product patch

www.netgear.com/support/product/ex2800 product patch

kb.netgear.com/...442/January-2026-NETGEAR-Security-Advisory vendor-advisory

cve.org (CVE-2026-0408)

nvd.nist.gov (CVE-2026-0408)

Download JSON