First published: Tue Jul 24 2018(Updated: )
A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Dgn2200 Firmware | =1.0.0.50_7.0.50 | |
Netgear DGN2200 | ||
Netgear Dgnd3700 Firmware | =1.0.0.17_1.0.17 | |
Netgear Dgnd3700 |
Netgear has released firmware version 1.0.0.52 for DGN2200 & 1.0.0.28 for DGND3700 to address this issue.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-5649 is critical.
CVE-2016-5649 allows a remote attacker to access the 'BSW_cxttongr.htm' page without authentication, exposing the admin password in clear text.
Netgear DGN2200 version DGN2200-V1.0.0.50_7.0.50 and DGND3700 version DGND3700-V1.0.0.17_1.0.17 are affected by CVE-2016-5649.
An attacker can exploit CVE-2016-5649 by accessing the 'BSW_cxttongr.htm' page without authentication and retrieving the admin password in clear text.
Yes, Netgear DGN2200 and DGND3700 are vulnerable to CVE-2016-5649.