Description
A path traversal vulnerability in NETGEAR WiFi range extenders allows
an attacker with LAN authentication to access the router's IP and
review the contents of the dynamically generated webproc file, which
records the username and password submitted to the router GUI.
Published: 2026-01-13
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via Path Traversal
Action: Patch Immediately
AI Analysis

Impact

Path traversal allows a LAN‑authenticated user to read the router’s webproc file, which contains plaintext usernames and passwords. This can expose account credentials that grant access to the management interface, enabling an attacker to maintain or elevate their foothold. The weakness is categorized as CWE‑287 (Improper Authentication).

Affected Systems

Vendors NETGEAR, products EX2800, EX3110, EX5000, and EX6110. Firmware versions prior to V1.0.1.82 are affected. Security advisories from Netgear identify the specific firmware releases that address the issue.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity. EPSS is less than 1%, implying a very low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires LAN access and valid authentication. Networks that expose the range extender’s local IP to untrusted devices or fail to secure the GUI pose a higher risk. Attacker benefits include credential theft and potential lateral movement within the LAN.

Generated by OpenCVE AI on April 18, 2026 at 06:44 UTC.

Remediation

Vendor Solution

Manually check the firmware version and update it to the latest. Fixed in: EX2800  firmware V1.0.1.82 or later https://www.netgear.com/support/product/ex2800 EX3110  firmware V1.0.1.82 or later https://www.netgear.com/support/product/ex3110 EX5000 firmware V1.0.1.82 or later https://www.netgear.com/support/product/ex5000 EX6110  firmware V1.0.1.82 or later https://www.netgear.com/support/product/ex6110


OpenCVE Recommended Actions

  • Upgrade all affected Netgear range extenders to firmware V1.0.1.82 or later.
  • After updating, configure local user accounts with strong, unique passwords and remove any default or unused accounts.
  • Restrict LAN access to the device’s management interface to trusted administrators only, if the device settings allow such restriction.

Generated by OpenCVE AI on April 18, 2026 at 06:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Netgear ex2800 Firmware
Netgear ex3110 Firmware
Netgear ex5000 Firmware
Netgear ex6110 Firmware
CPEs cpe:2.3:h:netgear:ex2800:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ex3110:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ex5000:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ex6110:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ex2800_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ex3110_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ex5000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:ex6110_firmware:*:*:*:*:*:*:*:*
Vendors & Products Netgear ex2800 Firmware
Netgear ex3110 Firmware
Netgear ex5000 Firmware
Netgear ex6110 Firmware
Metrics cvssV3_1

{'score': 8.0, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 14 Jan 2026 05:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 16:30:00 +0000


Tue, 13 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability in NETGEAR WiFi range extenders allows an attacker with LAN authentication to access the router's IP and review the contents of the dynamically generated webproc file, which records the username and password submitted to the router GUI.
Title Path traversal vulnerability in Netgear WiFi Range Extenders
First Time appeared Netgear
Netgear ex2800
Netgear ex3110
Netgear ex5000
Netgear ex6110
Weaknesses CWE-287
CPEs cpe:2.3:h:netgear:ex2800:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ex3110:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ex5000:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:ex6110:*:*:*:*:*:*:*:*
Vendors & Products Netgear
Netgear ex2800
Netgear ex3110
Netgear ex5000
Netgear ex6110
References
Metrics cvssV4_0

{'score': 6.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber'}


Subscriptions

Netgear Ex2800 Ex2800 Firmware Ex3110 Ex3110 Firmware Ex5000 Ex5000 Firmware Ex6110 Ex6110 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: NETGEAR

Published:

Updated: 2026-02-26T15:04:43.819Z

Reserved: 2025-12-03T04:16:14.964Z

Link: CVE-2026-0408

cve-icon Vulnrichment

Updated: 2026-01-13T16:38:39.113Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T16:16:11.017

Modified: 2026-02-20T19:41:22.173

Link: CVE-2026-0408

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:45:23Z

Weaknesses