A path traversal vulnerability in NETGEAR WiFi range extenders allows an attacker with LAN authentication to access the router's IP and review the contents of the dynamically generated webproc file, which records the username and password submitted to the router GUI.
https://www.netgear.com/support/product/ex6110
https://www.netgear.com/support/product/ex5000
https://www.netgear.com/support/product/ex3110
https://www.netgear.com/support/product/ex2800
https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory
Published: 2026-01-13
Updated: 2026-02-20
Base Score: 7.7
Vector: CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 8
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity: High
Base Score: 8.6
Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Severity: High
EPSS: 0.00045