Metrics
Affected Vendors & Products
Thu, 20 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 18 Mar 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 17 Mar 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-287 |
Mon, 17 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-319 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 19 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-287 | |
Metrics |
cvssV3_1
|
Tue, 18 Feb 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 18 Feb 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The administrative web interface of a Netgear C7800 Router running firmware version 6.01.07 (and possibly others) authenticates users via basic authentication, with an HTTP header containing a base64 value of the plaintext username and password. Because the web server also does not utilize transport security by default, this renders the administrative credentials vulnerable to eavesdropping by an adversary during every authenticated request made by a client to the router over a WLAN, or a LAN, should the adversary be able to perform a man-in-the-middle attack. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-02-18T00:00:00.000Z
Updated: 2025-03-20T17:08:00.247Z
Reserved: 2022-09-26T00:00:00.000Z
Link: CVE-2022-41545

Updated: 2025-02-18T18:03:32.631Z

Status : Awaiting Analysis
Published: 2025-02-18T18:15:13.450
Modified: 2025-03-20T17:15:36.803
Link: CVE-2022-41545

No data.