Description
An insufficient authentication vulnerability in NETGEAR WiFi range
extenders allows a network adjacent attacker with WiFi authentication or
a physical Ethernet port connection to bypass the authentication
process and access the admin panel.
Published: 2026-01-13
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Bypass Authentication
Action: Apply Patch
AI Analysis

Impact

An insufficient authentication flaw allows a nearby attacker who can either authenticate on the Wi‑Fi network or connect physically via the Ethernet port to circumvent the device’s login process and gain access to the administrative interface. The attacker can then configure or reconfigure the extender, potentially modify network settings, install malware, or use the device as a foothold for further attacks. The weakness is a classic authentication failure, identified as CWE-287, and the issue manifests as inappropriate acceptance of privileged operations without proper identity verification.

Affected Systems

The vulnerability affects NETGEAR Wi‑Fi range extenders EX2800, EX3110, EX5000 and EX6110. The affected firmware versions are those earlier than V1.0.1.82 for each model; any firmware version below that level is vulnerable. Ensuring the device displays the corrected firmware version confirms the vulnerability has been remediated.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, and the EPSS probability is less than 1%, suggesting exploitation is unlikely under normal circumstances. The security advisory does not list this flaw as a Known Exploited Vulnerability, so no evidence exists of active exploitation. Nevertheless, because a local or adjacent attacker who is physically or wirelessly near the extender can exploit it, the risk is materialized if an insider or neighboring device is compromised. The attack vector is inferred to be local, dependent on being in the same Wi‑Fi network or being able to access the Ethernet port.

Generated by OpenCVE AI on April 18, 2026 at 16:23 UTC.

Remediation

Vendor Solution

Manually check the firmware version and update it to the latest. Fixed in: EX2800  firmware V1.0.1.82 or later https://www.netgear.com/support/product/ex2800 EX3110  firmware V1.0.1.82 or later https://www.netgear.com/support/product/ex3110 EX5000 firmware V1.0.1.82 or later https://www.netgear.com/support/product/ex5000 EX6110  firmware V1.0.1.82 or later https://www.netgear.com/support/product/ex6110


OpenCVE Recommended Actions

  • Update the device firmware to EX2800 V1.0.1.82 or later, EX3110 V1.0.1.82 or later, EX5000 V1.0.1.82 or later, or EX6110 V1.0.1.82 or later as specified by NETGEAR.
  • Configure the Wi‑Fi network to use WPA2‑PSK or WPA3‑PSK with a strong passphrase, and consider disabling the remote administration feature if not required for local management.
  • Restrict access to the device management interface to trusted local networks or specific IP ranges, or enable the built‑in firewall to block unauthorized traffic to the management port.

Generated by OpenCVE AI on April 18, 2026 at 16:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Netgear ex2800 Firmware
Netgear ex3110 Firmware
Netgear ex5000 Firmware
Netgear ex6110 Firmware
CPEs cpe:2.3:h:netgear:ex2800:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ex3110:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ex5000:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ex6110:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ex2800_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ex3110_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ex5000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ex6110_firmware:*:*:*:*:*:*:*:*
Vendors & Products Netgear ex2800 Firmware
Netgear ex3110 Firmware
Netgear ex5000 Firmware
Netgear ex6110 Firmware
Metrics cvssV3_1

{'score': 8.0, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Tue, 13 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 16:30:00 +0000


Tue, 13 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Description An insufficient authentication vulnerability in NETGEAR WiFi range extenders allows a network adjacent attacker with WiFi authentication or a physical Ethernet port connection to bypass the authentication process and access the admin panel.
Title Authentication bypass in NETGEAR WiFi Range Extenders via network adjacent attacks
First Time appeared Netgear
Netgear ex2800
Netgear ex3110
Netgear ex5000
Netgear ex6110
Weaknesses CWE-287
CPEs cpe:2.3:h:netgear:ex2800:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ex3110:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ex5000:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ex6110:*:*:*:*:*:*:*:*
Vendors & Products Netgear
Netgear ex2800
Netgear ex3110
Netgear ex5000
Netgear ex6110
References
Metrics cvssV4_0

{'score': 6.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber'}


Subscriptions

Netgear Ex2800 Ex2800 Firmware Ex3110 Ex3110 Firmware Ex5000 Ex5000 Firmware Ex6110 Ex6110 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: NETGEAR

Published:

Updated: 2026-02-26T15:04:44.118Z

Reserved: 2025-12-03T04:16:13.882Z

Link: CVE-2026-0407

cve-icon Vulnrichment

Updated: 2026-01-13T18:47:37.449Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T16:16:10.840

Modified: 2026-02-20T19:40:59.627

Link: CVE-2026-0407

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:30:05Z

Weaknesses