First published: Mon May 18 2020(Updated: )
An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite (SRS60) AC3000 V2.5.1.106, Outdoor Satellite (RBS50Y) V2.5.1.106, and Pro Tri-Band Business WiFi Router (SRR60) AC3000 V2.5.1.106. The root account has the same password as the Web-admin component. Thus, by exploiting CVE-2020-11551, it is possible to achieve remote code execution with root privileges on the embedded Linux system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Rbs50y Firmware | =2.5.1.106 | |
Netgear Rbs50y | ||
Netgear Srr60 Firmware | =2.5.1.106 | |
Netgear Srr60 | ||
Netgear Srs60 Firmware | =2.5.1.106 | |
Netgear Srs60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue on NETGEAR devices is CVE-2020-11549.
CVE-2020-11549 has a severity level of 8.8 (high).
NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite (SRS60) AC3000 V2.5.1.106, Outdoor Satellite (RBS50Y) V2.5.1.106, and Pro Tri-Band Business WiFi Router (SRR60) AC3000 V2.5.1.106 are affected by CVE-2020-11549.
The vulnerability in CVE-2020-11549 is that the root account has the same password as the Web-admin component.
Please refer to the references provided for mitigation recommendations for CVE-2020-11549.