First published: Mon Jan 30 2017(Updated: )
The NETGEAR WNR2000v5 router leaks its serial number when performing a request to the /BRS_netgear_success.html URI. This serial number allows a user to obtain the administrator username and password, when used in combination with the CVE-2016-10176 vulnerability that allows resetting the answers to the password-recovery questions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR WNR2000v5 firmware | <=1.0.0.34 | |
NETGEAR WNR2000v5 firmware |
http://kb.netgear.com/000036549/Insecure-Remote-Access-and-Command-Execution-Security-Vulnerability
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10175 has a medium severity due to the exposure of sensitive information, specifically the router's serial number.
To fix CVE-2016-10175, update the NETGEAR WNR2000v5 firmware to the latest version that addresses this vulnerability.
CVE-2016-10175 affects the NETGEAR WNR2000v5 router firmware versions up to and including 1.0.0.34.
The impact of CVE-2016-10175 is the potential compromise of administrative credentials due to serial number exposure.
Yes, CVE-2016-10175 is related to CVE-2016-10176, which could allow an attacker to reset the admin password using the leaked serial number.