Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2015-8289
Deferred
More InfoOfficial Page
Source-cret@cert.org
View Known Exploited Vulnerability (KEV) details
Published At-20 Jun, 2016 | 01:59
Updated At-12 Apr, 2025 | 10:46

The password-recovery feature on NETGEAR D3600 devices with firmware 1.0.0.49 and D6000 devices with firmware 1.0.0.49 and earlier allows remote attackers to discover the cleartext administrator password by reading the cgi-bin/passrec.asp HTML source code.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.5HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

NETGEAR, Inc.
netgear
>>d3600_firmware>>1.0.0.49
cpe:2.3:o:netgear:d3600_firmware:1.0.0.49:*:*:*:*:*:*:*
NETGEAR, Inc.
netgear
>>d3600>>-
cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*
NETGEAR, Inc.
netgear
>>d6000_firmware>>Versions up to 1.0.0.49(inclusive)
cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*
NETGEAR, Inc.
netgear
>>d6000>>-
cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarynvd@nist.gov
CWE-255Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://kb.netgear.com/app/answers/detail/a_id/30490cret@cert.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/778696cret@cert.org
Third Party Advisory
US Government Resource
http://kb.netgear.com/app/answers/detail/a_id/30490af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.kb.cert.org/vuls/id/778696af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
Change History
0Changes found

Details not found