vendor:
R6120
by:
Wadeek
8.8
CVSS
HIGH
Credential Disclosure
200
CWE
Product Name: R6120
Affected Version From: 1.0.0.30
Affected Version To: 1.0.0.30
Patch Exists: YES
Related CWE: N/A
CPE: h:netgear:r6120
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux, MIPSLE
2018
NETGEAR WiFi Router R6120 – Credential Disclosure
An authenticated Telnet command execution vulnerability exists in NETGEAR WiFi Router R6120 with firmware version 1.0.0.30. An attacker can exploit this vulnerability by sending a POST request to http://192.168.1.1/401_recovery.htm with the serial number of the router. This will bypass the security questions and allow the attacker to gain access to the router admin username and password. The attacker can then use the credentials to telnet into the router and execute commands.
Mitigation:
Users should update their router firmware to the latest version available from the vendor.