Netgear RAX43 version 1.0.3.96 makes use of hardcoded credentials. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted. This encryption is accomplished via a password-protected zip file with a hardcoded password (RAX50w!a4udk). By unzipping the configuration using this password, a user can reconfigure settings not intended to be manipulated, re-zip the configuration, and restore a backup causing these settings to be changed.
References
Link Resource
https://www.tenable.com/security/research/tra-2021-55 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: tenable

Published: 2021-12-30T21:31:15

Updated: 2021-12-30T21:31:15

Reserved: 2020-12-17T00:00:00


Link: CVE-2021-20170

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-12-30T22:15:09.607

Modified: 2022-01-11T14:26:08.810


Link: CVE-2021-20170

JSON object: View

cve-icon Redhat Information

No data.

CWE