NETGEAR ProSafe GS724Tv3 and GS716Tv2 with firmware 5.4.1.13 and earlier; GS748Tv4 with firmware 5.4.1.14; GS510TP with firmware 5.4.0.6; GS752TPS, GS728TPS, GS728TS, and GS725TS with firmware 5.3.0.17; and GS752TXS and GS728TXS with firmware 6.1.0.12 allows remote attackers to read encrypted administrator credentials and other startup configurations via a direct request to filesystem/startup-config.
References
Link | Resource |
---|---|
http://www.encripto.no/forskning/whitepapers/Netgear_prosafe_advisory_aug_2013.pdf | Exploit |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Information
Published : 2013-12-18 20:24
Updated : 2013-12-19 11:19
NVD link : CVE-2013-4775
Mitre link : CVE-2013-4775
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
netgear
- prosafe_gs728tps
- prosafe_gs752tps
- prosafe_firmware
- prosafe_gs724t
- prosafe_gs728ts
- prosafe_gs748t
- prosafe_gs510tp
- prosafe_gs728txs
- prosafe_gs725ts
- prosafe_s716t
- prosafe_gs752txs