Vulnerability Note VU#644812
NetGear WNAP210 remote password disclosure and password bypass vulnerability
NetGear WNAP210 is vulnerable to remote administrator password disclosure and administrative web page login bypass.
Netgear's ProSafe Wireless-N Access Point WNAP210 contains a vulnerability which may allow a remote unauthenticated attacker to recover the device's administrator password. An attacker with network access to the device can navigate to the web page http://NetGearDeviceIP/BackupConfig.php. The attacker will be prompted to download the device's configuration without entering any login credentials. This configuration file will contain the device's administrator password stored in plaintext.
This vulnerability has been reported in Netgear's ProSafe Wireless-N Access Point WNAP210 firmware version 2.0.12.
A remote unauthenticated attacker may be able to retrieve the device's administrator password, and bypass the device's login web page allowing them to directly access the device's configuration web page.
Restrict network access
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Netgear, Inc.||Affected||10 Jan 2011||02 Sep 2011|
CVSS Metrics (Learn More)
Thanks to Trevor Seward for reporting this vulnerability.
This document was written by Michael Orlando.
- CVE IDs: Unknown
- Date Public: 05 Apr 2011
- Date First Published: 05 Apr 2011
- Date Last Updated: 02 Sep 2011
- Severity Metric: 5.10
- Document Revision: 18
If you have feedback, comments, or additional information about this vulnerability, please send us email.