Description
NETGEAR ProSafe GS724Tv3 and GS716Tv2 with firmware 5.4.1.13 and earlier; GS748Tv4 with firmware 5.4.1.14; GS510TP with firmware 5.4.0.6; GS752TPS, GS728TPS, GS728TS, and GS725TS with firmware 5.3.0.17; and GS752TXS and GS728TXS with firmware 6.1.0.12 allows remote attackers to read encrypted administrator credentials and other startup configurations via a direct request to filesystem/startup-config.
Exploits (1)
exploitdb
WORKING POC
by Juan J. Guelfo · pythonwebappshardware
https://www.exploit-db.com/exploits/27774
References (1)
Core 1
Core References
Exploit x_refsource_misc
http://www.encripto.no/forskning/whitepapers/Netgear_prosafe_advisory_aug_2013.pdf
Scores
EPSS
0.1158
EPSS Percentile
93.7%
Details
CWE
CWE-200
Status
published
Products (17)
netgear/prosafe_firmware
5.3.0.17
netgear/prosafe_firmware
5.0.4.4
netgear/prosafe_firmware
5.4.0.6
netgear/prosafe_firmware
5.4.1.10
netgear/prosafe_firmware
6.1.0.12
netgear/prosafe_firmware
5.4.1.13
netgear/prosafe_firmware
< 5.4.1.13
netgear/prosafe_gs510tp
netgear/prosafe_gs724t
v3
netgear/prosafe_gs725ts
... and 7 more
Published
Dec 19, 2013
Tracked Since
Feb 18, 2026