A vulnerability was found in Netgear WNR614 1.1.0.28_1.0.1WW. It has been classified as critical. This affects an unknown part of the component URL Handler. The manipulation with the input %00currentsetting.htm leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This issue appears to have been circulating as an 0day since 2024.
References
Link | Resource |
---|---|
https://github.com/Shuanunio/CVE_Requests/blob/main/Netgear/WNR614/ACL%20bypass%20Vulnerability%20in%20Netgear%20WNR614.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.310911 | Permissions Required VDB Entry |
https://vuldb.com/?id.310911 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.584939 | Third Party Advisory VDB Entry |
https://www.netgear.com/ | Product |
https://github.com/Shuanunio/CVE_Requests/blob/main/Netgear/WNR614/ACL%20bypass%20Vulnerability%20in%20Netgear%20WNR614.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
02 Jul 2025, 14:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-03 13:15
Updated : 2025-07-02 14:24
NVD link : CVE-2025-5495
Mitre link : CVE-2025-5495
CVE.ORG link : CVE-2025-5495
JSON object : View
Products Affected
netgear
- wnr614_firmware
- wnr614
CWE
CWE-287
Improper Authentication