Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6x2m-2w3q-qqp5

Опубликовано: 31 дек. 2021
Источник: github
Github: Не прошло ревью

Описание

Netgear Nighthawk R6700 version 1.0.4.120 makes use of a hardcoded credential. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted/obfuscated. By extracting the configuration using readily available public tools, a user can reconfigure settings not intended to be manipulated, repackage the configuration, and restore a backup causing these settings to be changed.

Netgear Nighthawk R6700 version 1.0.4.120 makes use of a hardcoded credential. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted/obfuscated. By extracting the configuration using readily available public tools, a user can reconfigure settings not intended to be manipulated, repackage the configuration, and restore a backup causing these settings to be changed.

EPSS

Процентиль: 52%
0.00288
Низкий

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 8.8
nvd
около 4 лет назад

Netgear Nighthawk R6700 version 1.0.4.120 makes use of a hardcoded credential. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted/obfuscated. By extracting the configuration using readily available public tools, a user can reconfigure settings not intended to be manipulated, repackage the configuration, and restore a backup causing these settings to be changed.

EPSS

Процентиль: 52%
0.00288
Низкий

Дефекты

CWE-798