// For flags

CVE-2016-5638

Netgear WNDR4500 running firmware version V1.0.1.40_1.0.6877 reveals some sensitive information such as 2.4GHz & 5GHz Wireless Network Name (SSID) and Network Key (Password) in clear text

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

There are few web pages associated with the genie app on the Netgear WNDR4500 running firmware version V1.0.1.40_1.0.6877. Genie app adds some capabilities over the Web GUI and can be accessed even when you are away from home. A remote attacker can access genie_ping.htm or genie_ping2.htm or genie_ping3.htm page without authentication. Once accessed, the page will be redirected to the aCongratulations2.htma page, which reveals some sensitive information such as 2.4GHz & 5GHz Wireless Network Name (SSID) and Network Key (Password) in clear text.

Hay unas pocas páginas web asociadas con la aplicación genie en Netgear WNDR4500 que ejecutan la versión del firmware V1.0.1.40_1.0.6877. La aplicación genie agrega algunas capacidades en la interfaz gráfica de usuario web y se puede acceder a ella incluso aunque no se esté en casa. Un atacante remoto puede acceder a las páginas genie_ping.htm, genie_ping2.htm o genie_ping3.htm sin autenticación. Una vez se accede a ellas, la página se redirigirá a la página aCongratulations2.htma, que revela cierta información sensible como el nombre de red inalámbrica 2.4GHz 5GHz (SSID) y la clave de red (contraseña) en texto claro.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-06-16 CVE Reserved
  • 2017-01-03 CVE Published
  • 2024-03-12 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-319: Cleartext Transmission of Sensitive Information
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Netgear
Search vendor "Netgear"
Wndr4500 Firmware
Search vendor "Netgear" for product "Wndr4500 Firmware"
1.0.1.40_1.0.6877
Search vendor "Netgear" for product "Wndr4500 Firmware" and version "1.0.1.40_1.0.6877"
-
Affected
in Netgear
Search vendor "Netgear"
Wndr4500
Search vendor "Netgear" for product "Wndr4500"
--
Safe