Description
A vulnerability was found in Netgear WNR614 1.1.0.28_1.0.1WW. It has been classified as critical. This affects an unknown part of the component URL Handler. The manipulation with the input %00currentsetting.htm leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This issue appears to have been circulating as an 0day since 2024.
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.310911
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.310911
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.584939
Exploit, Third Party Advisory exploit
https://github.com/Shuanunio/CVE_Requests/blob/main/Netgear/WNR614/ACL%20bypass%20Vulnerability%20in%20Netgear%20WNR614.md
Product product
https://www.netgear.com/
Scores
CVSS v3
7.3
EPSS
0.0092
EPSS Percentile
76.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-287
Status
published
Products (1)
netgear/wnr614_firmware
1.1.0.28
Published
Jun 03, 2025
Tracked Since
Feb 18, 2026