Cyber Posture

CVE-2026-0408

High

Published: 13 January 2026

Published
13 January 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 19.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0408 is a high-severity Improper Authentication (CWE-287) vulnerability in Netgear Ex2800 Firmware. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Credentials In Files (T1552.001); ranked at the 19.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Credentials In Files (T1552.001). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates path traversal by requiring validation of user-supplied inputs used to construct file paths in the web interface, preventing unauthorized access to the webproc credential file.

prevent

Enforces approved authorizations to restrict even low-privilege LAN-authenticated users from accessing sensitive dynamically generated files outside intended directories via traversal.

prevent

Addresses the specific CVE by requiring timely flaw remediation through installation of NETGEAR patches from the published security advisory.

MITRE ATT&CK Enterprise TechniquesAI

T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Path traversal directly enables reading the webproc file containing submitted GUI credentials, mapping to unsecured credentials in files.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A path traversal vulnerability in NETGEAR WiFi range extenders allows an attacker with LAN authentication to access the router's IP and review the contents of the dynamically generated webproc file, which records the username and password submitted to the router…

more

GUI.

Deeper analysisAI

CVE-2026-0408 is a path traversal vulnerability in NETGEAR WiFi range extenders, including models EX2800, EX3110, EX5000, and EX6110. Published on 2026-01-13, the issue allows an attacker with LAN authentication to access the router's IP address and review the contents of the dynamically generated webproc file, which records usernames and passwords submitted to the router GUI. It carries a CVSS v3.1 base score of 8.0 (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-287 (Improper Authentication).

Exploitation requires an attacker to be adjacent on the network with low-privilege LAN authentication, enabling low-complexity access without user interaction. Upon success, the attacker can achieve high confidentiality impact by extracting submitted router GUI credentials, alongside high integrity and availability impacts within the unchanged scope.

NETGEAR has published a security advisory at https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory, with product support pages for the affected models at https://www.netgear.com/support/product/ex2800, https://www.netgear.com/support/product/ex3110, https://www.netgear.com/support/product/ex5000, and https://www.netgear.com/support/product/ex6110.

Details

CWE(s)

Affected Products

netgear
ex2800 firmware
≤ 1.0.1.82
netgear
ex3110 firmware
≤ 1.0.1.82
netgear
ex5000 firmware
≤ 1.0.1.82
netgear
ex6110 firmware
≤ 1.0.1.82

CVEs Like This One

CVE-2026-0407Same product: Netgear Ex2800
CVE-2026-0405Same vendor: Netgear
CVE-2024-57046Same vendor: Netgear
CVE-2024-54805Same vendor: Netgear
CVE-2025-50526Same vendor: Netgear
CVE-2024-54803Same vendor: Netgear
CVE-2026-0404Same vendor: Netgear
CVE-2025-44658Same vendor: Netgear
CVE-2025-7407Same vendor: Netgear
CVE-2024-54809Same vendor: Netgear

References