The administrative web interface of a Netgear C7800 Router running firmware version 6.01.07 (and possibly others) authenticates users via basic authentication, with an HTTP header containing a base64 value of the plaintext username and password. Because the web server also does not utilize transport security by default, this renders the administrative credentials vulnerable to eavesdropping by an adversary during every authenticated request made by a client to the router over a WLAN, or a LAN, should the adversary be able to perform a man-in-the-middle attack.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| http://seclists.org/fulldisclosure/2025/Feb/12 | Mailing List Third Party Advisory |
| https://seclists.org/fulldisclosure/2025/Feb/12 | Mailing List Third Party Advisory |
| https://www.netgear.com/about/security/ | Vendor Advisory |
| https://www.netgear.com/images/datasheet/networking/cablemodems/C7800.pdf | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
06 Jun 2025, 18:01
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Netgear c7800 Firmware
Netgear Netgear c7800 |
|
| CPE | cpe:2.3:o:netgear:c7800_firmware:6.01.07:*:*:*:*:*:*:* cpe:2.3:h:netgear:c7800:-:*:*:*:*:*:*:* |
|
| References | () https://seclists.org/fulldisclosure/2025/Feb/12 - Mailing List, Third Party Advisory | |
| References | () https://www.netgear.com/images/datasheet/networking/cablemodems/C7800.pdf - Product | |
| References | () http://seclists.org/fulldisclosure/2025/Feb/12 - Mailing List, Third Party Advisory | |
| References | () https://www.netgear.com/about/security/ - Vendor Advisory |
18 Feb 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-18 18:15
Updated : 2025-06-06 18:01
NVD link : CVE-2022-41545
Mitre link : CVE-2022-41545
JSON object : View
Products Affected
netgear
- c7800_firmware
- c7800
CWE
No CWE.
