Netgear Router Administrative Web Interface Lacks Transport Encryption By Default
Netgear C7800路由器固件6.01.07版本默认未启用传输加密,管理界面使用基本认证,用户名和密码以明文形式传输,易被窃取。 2025-2-16 08:0:6 Author: seclists.org(查看原文) 阅读量:11 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Ryan Delaney via Fulldisclosure <fulldisclosure () seclists org>
Date: Thu, 13 Feb 2025 15:25:14 -0600

<!--
# Exploit Title: Netgear Router Administrative Web Interface Lacks
Transport Encryption By Default
# Date: 02-13-2025
# Exploit Author: Ryan Delaney
# Author Contact: ryan.delaney () owasp org
# Vendor Homepage: https://www.netgear.com
# Version: Netgear C7800 Router, F/W 6.01.07, possibly others
# Tested on: Netgear C7800 Router, F/W 6.01.07
# CVE: CVE-2022-41545

The administrative web interface of a Netgear C7800 Router running firmware
version 6.01.07 (and possibly others) authenticates users via basic
authentication, with an HTTP header containing a base64 value of the
plaintext username and password. Because the web server also does not
utilize transport security by default, this renders the administrative
credentials vulnerable to eavesdropping by an adversary during every
authenticated request made by a client to the router over a WLAN, or a LAN,
should the adversary be able to perform a man-in-the-middle attack.
-->
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • Netgear Router Administrative Web Interface Lacks Transport Encryption By Default Ryan Delaney via Fulldisclosure (Feb 16)

文章来源: https://seclists.org/fulldisclosure/2025/Feb/12
如有侵权请联系:admin#unsafe.sh