First published: Tue Feb 18 2025(Updated: )
The administrative web interface of a Netgear C7800 Router running firmware version 6.01.07 (and possibly others) authenticates users via basic authentication, with an HTTP header containing a base64 value of the plaintext username and password. Because the web server also does not utilize transport security by default, this renders the administrative credentials vulnerable to eavesdropping by an adversary during every authenticated request made by a client to the router over a WLAN, or a LAN, should the adversary be able to perform a man-in-the-middle attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear C7800 Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41545 has a high severity rating due to its basic authentication vulnerabilities in the Netgear C7800 Router's administrative web interface.
To fix CVE-2022-41545, update the firmware of your Netgear C7800 Router to the latest version available from Netgear.
Users of the Netgear C7800 Router running firmware version 6.01.07 or earlier are affected by CVE-2022-41545.
The potential impacts of CVE-2022-41545 include unauthorized access to the router's administrative interface and exposure of sensitive information.
CVE-2022-41545 is specifically associated with the Netgear C7800 Router, and the issue may not necessarily apply to other Netgear products.