NETGEAR WiFi Range Extender Path Traversal Exposes Credentials
CVE-2026-0408 Published on January 13, 2026

Path traversal vulnerability in Netgear WiFi Range Extenders
A path traversal vulnerability in NETGEAR WiFi range extenders allows an attacker with LAN authentication to access the router's IP and review the contents of the dynamically generated webproc file, which records the username and password submitted to the router GUI.

Vendor Advisory NVD

Weakness Type

What is an authentification Vulnerability?

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE-2026-0408 has been classified to as an authentification vulnerability or weakness.


Products Associated with CVE-2026-0408

Want to know whenever a new CVE is published for Netgear products? stack.watch will email you.

 
 
 
 

Affected Versions

NETGEAR EX5000: NETGEAR EX3110: NETGEAR EX6110: NETGEAR EX2800:

Exploit Probability

EPSS
0.06%
Percentile
19.21%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.