First published: Mon May 18 2020(Updated: )
An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite (SRS60) AC3000 V2.5.1.106, Outdoor Satellite (RBS50Y) V2.5.1.106, and Pro Tri-Band Business WiFi Router (SRR60) AC3000 V2.5.1.106. The administrative SOAP interface allows an unauthenticated remote write of arbitrary Wi-Fi configuration data such as authentication details (e.g., the Web-admin password), network settings, DNS settings, system administration interface configuration, etc.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Rbs50y Firmware | =2.5.1.106 | |
Netgear Rbs50y | ||
Netgear Srr60 Firmware | =2.5.1.106 | |
Netgear Srr60 | ||
Netgear Srs60 Firmware | =2.5.1.106 | |
Netgear Srs60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-11551 is critical.
The affected software for CVE-2020-11551 includes NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite (SRS60) AC3000 V2.5.1.106, Outdoor Satellite (RBS50Y) V2.5.1.106, and Pro Tri-Band Business WiFi Router (SRR60) AC3000 V2.5.1.106.
An attacker can exploit CVE-2020-11551 by using the unauthenticated remote write of arbitrary Wi-Fi parameters via the administrative SOAP interface.
Currently, there are no known fixes for CVE-2020-11551. It is recommended to implement other security measures and follow any recommendations provided by the vendor.
You can find more information about CVE-2020-11551 on the following references: [link1](https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security), [link2](https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt), [link3](https://www.modzero.com/modlog/archives/2020/05/18/how_netgear_meshed_up_wifi_for_business/index.html)