A path traversal vulnerability in NETGEAR WiFi range extenders allows
an attacker with LAN authentication to access the router's IP and
review the contents of the dynamically generated webproc file, which
records the username and password submitted to the router GUI.
References
| Link | Resource |
|---|---|
| https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory | Vendor Advisory Patch |
| https://www.netgear.com/support/product/ex2800 | Product Patch |
| https://www.netgear.com/support/product/ex3110 | Product Patch |
| https://www.netgear.com/support/product/ex5000 | Product Patch |
| https://www.netgear.com/support/product/ex6110 | Product Patch |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-13 16:16
Updated : 2026-02-20 19:41
NVD link : CVE-2026-0408
Mitre link : CVE-2026-0408
CVE.ORG link : CVE-2026-0408
JSON object : View
Products Affected
netgear
- ex5000
- ex3110_firmware
- ex3110
- ex6110_firmware
- ex2800_firmware
- ex2800
- ex6110
- ex5000_firmware
CWE
CWE-287
Improper Authentication
