This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of multiple NETGEAR routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the lack of authentication prior to allowing access to system configuration information. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
Affected Software | Affected Version | How to fix |
---|---|---|
NETGEAR Multiple Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-13708 has a high severity rating due to the ability to disclose sensitive information without authentication.
To fix ZDI-CAN-13708, you should ensure your NETGEAR router's firmware is updated to the latest version provided by NETGEAR.
ZDI-CAN-13708 affects multiple models of NETGEAR routers that utilize the httpd service on TCP port 80.
Yes, ZDI-CAN-13708 can be exploited by network-adjacent attackers, meaning they must be on the same local network.
Exploitation of ZDI-CAN-13708 may result in unauthorized access to sensitive information stored on the router.