Vulnerability Description
The NetGear ProSafe WNAP210 with firmware 2.0.12 allows remote attackers to bypass authentication and obtain access to the configuration page by visiting recreate.php and then visiting index.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Prosafe Wnap210 | All versions |
| Netgear | Prosafe Wnap210 Firmware | 2.0.12 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/44045
- http://www.kb.cert.org/vuls/id/644812US Government Resource
- http://www.vupen.com/english/advisories/2011/0884
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66723
- http://secunia.com/advisories/44045
- http://www.kb.cert.org/vuls/id/644812US Government Resource
- http://www.vupen.com/english/advisories/2011/0884
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66723
FAQ
What is CVE-2011-1674?
CVE-2011-1674 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The NetGear ProSafe WNAP210 with firmware 2.0.12 allows remote attackers to bypass authentication and obtain access to the configuration page by visiting recreate.php and then visiting index.php.
How severe is CVE-2011-1674?
CVE-2011-1674 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1674?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Prosafe Wnap210, Netgear Prosafe Wnap210 Firmware.