Логотип exploitDog
bind:CVE-2021-20175
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-20175

Количество 2

Количество 2

nvd логотип

CVE-2021-20175

около 4 лет назад

Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the SOAP interface. By default, all communication to/from the device's SOAP Interface (port 5000) is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-47jc-2cqh-wc8g

около 4 лет назад

Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the SOAP interface. By default, all communication to/from the device's SOAP Interface (port 5000) is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-20175

Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the SOAP interface. By default, all communication to/from the device's SOAP Interface (port 5000) is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext

CVSS3: 7.5
0%
Низкий
около 4 лет назад
github логотип
GHSA-47jc-2cqh-wc8g

Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the SOAP interface. By default, all communication to/from the device's SOAP Interface (port 5000) is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext

0%
Низкий
около 4 лет назад

Уязвимостей на страницу