Impact
An insufficient authentication flaw allows a nearby attacker who can either authenticate on the Wi‑Fi network or connect physically via the Ethernet port to circumvent the device’s login process and gain access to the administrative interface. The attacker can then configure or reconfigure the extender, potentially modify network settings, install malware, or use the device as a foothold for further attacks. The weakness is a classic authentication failure, identified as CWE-287, and the issue manifests as inappropriate acceptance of privileged operations without proper identity verification.
Affected Systems
The vulnerability affects NETGEAR Wi‑Fi range extenders EX2800, EX3110, EX5000 and EX6110. The affected firmware versions are those earlier than V1.0.1.82 for each model; any firmware version below that level is vulnerable. Ensuring the device displays the corrected firmware version confirms the vulnerability has been remediated.
Risk and Exploitability
The CVSS score of 6.1 indicates moderate severity, and the EPSS probability is less than 1%, suggesting exploitation is unlikely under normal circumstances. The security advisory does not list this flaw as a Known Exploited Vulnerability, so no evidence exists of active exploitation. Nevertheless, because a local or adjacent attacker who is physically or wirelessly near the extender can exploit it, the risk is materialized if an insider or neighboring device is compromised. The attack vector is inferred to be local, dependent on being in the same Wi‑Fi network or being able to access the Ethernet port.
OpenCVE Enrichment