Impact
Path traversal allows a LAN‑authenticated user to read the router’s webproc file, which contains plaintext usernames and passwords. This can expose account credentials that grant access to the management interface, enabling an attacker to maintain or elevate their foothold. The weakness is categorized as CWE‑287 (Improper Authentication).
Affected Systems
Vendors NETGEAR, products EX2800, EX3110, EX5000, and EX6110. Firmware versions prior to V1.0.1.82 are affected. Security advisories from Netgear identify the specific firmware releases that address the issue.
Risk and Exploitability
The CVSS score of 6.1 indicates moderate severity. EPSS is less than 1%, implying a very low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires LAN access and valid authentication. Networks that expose the range extender’s local IP to untrusted devices or fail to secure the GUI pose a higher risk. Attacker benefits include credential theft and potential lateral movement within the LAN.
OpenCVE Enrichment