Netgear RAX43 version 1.0.3.96 does not have sufficient protections to the UART interface. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user. These default credentials are admin:admin.
References
Link Resource
https://www.tenable.com/security/research/tra-2021-55 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: tenable

Published: 2021-12-30T21:31:17

Updated: 2021-12-30T21:31:17

Reserved: 2020-12-17T00:00:00


Link: CVE-2021-20168

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-12-30T22:15:09.507

Modified: 2022-07-12T17:42:04.277


Link: CVE-2021-20168

JSON object: View

cve-icon Redhat Information

No data.

CWE