The administrative web interface of a Netgear C7800 Router running firmware version 6.01.07 (and possibly others) authenticates users via basic authentication, with an HTTP header containing a base64 value of the plaintext username and password. Because the web server also does not utilize transport security by default, this renders the administrative credentials vulnerable to eavesdropping by an adversary during every authenticated request made by a client to the router over a WLAN, or a LAN, should the adversary be able to perform a man-in-the-middle attack.
Metrics
Affected Vendors & Products
References
History
Wed, 19 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-287 | |
Metrics |
cvssV3_1
|
Tue, 18 Feb 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 18 Feb 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The administrative web interface of a Netgear C7800 Router running firmware version 6.01.07 (and possibly others) authenticates users via basic authentication, with an HTTP header containing a base64 value of the plaintext username and password. Because the web server also does not utilize transport security by default, this renders the administrative credentials vulnerable to eavesdropping by an adversary during every authenticated request made by a client to the router over a WLAN, or a LAN, should the adversary be able to perform a man-in-the-middle attack. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-02-18T00:00:00.000Z
Updated: 2025-02-19T15:10:29.149Z
Reserved: 2022-09-26T00:00:00.000Z
Link: CVE-2022-41545

Updated: 2025-02-18T18:03:32.631Z

Status : Awaiting Analysis
Published: 2025-02-18T18:15:13.450
Modified: 2025-02-19T15:15:11.890
Link: CVE-2022-41545

No data.