HIGH · 7.5

CVE-2022-4874

Authentication bypass in Netcomm router models NF20MESH, NF20, and NL1902 allows an unauthenticated user to access content. In order to serve static content, the application performs a check for the e...

Vulnerability Description

Authentication bypass in Netcomm router models NF20MESH, NF20, and NL1902 allows an unauthenticated user to access content. In order to serve static content, the application performs a check for the existence of specific characters in the URL (.css, .png etc). If it exists, it performs a "fake login" to give the request an active session to load the file and not redirect to the login page.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
NetcommwirelessNf20 Firmware< r6b025
NetcommwirelessNf20-
NetcommwirelessNf20Mesh Firmware< r6b025
NetcommwirelessNf20Mesh-
NetcommwirelessNl1902 Firmware< r6b025
NetcommwirelessNl1902-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-4874?

CVE-2022-4874 is a vulnerability with a CVSS score of 7.5 (HIGH). Authentication bypass in Netcomm router models NF20MESH, NF20, and NL1902 allows an unauthenticated user to access content. In order to serve static content, the application performs a check for the e...

How severe is CVE-2022-4874?

CVE-2022-4874 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-4874?

Check the references section above for vendor advisories and patch information. Affected products include: Netcommwireless Nf20 Firmware, Netcommwireless Nf20, Netcommwireless Nf20Mesh Firmware, Netcommwireless Nf20Mesh, Netcommwireless Nl1902 Firmware.