an attacker with LAN authentication to access the router's IP and
review the contents of the dynamically generated webproc file, which
records the username and password submitted to the router GUI.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Manually check the firmware version and update it to the latest. Fixed in: EX2800 firmware V1.0.1.82 or later https://www.netgear.com/support/product/ex2800 EX3110 firmware V1.0.1.82 or later https://www.netgear.com/support/product/ex3110 EX5000 firmware V1.0.1.82 or later https://www.netgear.com/support/product/ex5000 EX6110 firmware V1.0.1.82 or later https://www.netgear.com/support/product/ex6110
Workaround
No workaround given by the vendor.
Tue, 13 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 13 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability in NETGEAR WiFi range extenders allows an attacker with LAN authentication to access the router's IP and review the contents of the dynamically generated webproc file, which records the username and password submitted to the router GUI. | |
| Title | Path traversal vulnerability in Netgear WiFi Range Extenders | |
| First Time appeared |
Netgear
Netgear ex2800 Netgear ex3110 Netgear ex5000 Netgear ex6110 |
|
| Weaknesses | CWE-287 | |
| CPEs | cpe:2.3:h:netgear:ex2800:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:ex3110:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:ex5000:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:ex6110:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Netgear
Netgear ex2800 Netgear ex3110 Netgear ex5000 Netgear ex6110 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: NETGEAR
Published:
Updated: 2026-01-13T16:38:45.105Z
Reserved: 2025-12-03T04:16:14.964Z
Link: CVE-2026-0408
No data.
Status : Received
Published: 2026-01-13T16:16:11.017
Modified: 2026-01-13T17:16:00.117
Link: CVE-2026-0408
No data.
OpenCVE Enrichment
No data.