CVE-2022-25214

7.4 HIGH

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to access sensitive network information and wireless passwords through exposed web interfaces. It affects NETGEAR Orbi Pro WiFi 6 (SXK80) systems with Remote Management enabled. Attackers can obtain device IP/MAC addresses and WPA passphrases for both 2.4GHz and 5.0GHz networks.

💻 Affected Systems

Products:
  • NETGEAR Orbi Pro WiFi 6 (SXK80)
Versions: Firmware versions prior to V2.6.5.102
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when Remote Management is enabled. The setup wizard encourages using the same password for WiFi and admin interface via a checkbox option.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network compromise including administrative access if users selected the same password for WiFi and admin interface, allowing attackers to join the network and potentially access other connected devices.

🟠

Likely Case

Unauthorized network access and device enumeration, enabling attackers to map the network, identify targets, and potentially launch further attacks against connected devices.

🟢

If Mitigated

Limited information disclosure if Remote Management is disabled, though local network attackers could still exploit the vulnerability.

🌐 Internet-Facing: HIGH - When Remote Management is enabled, these endpoints are directly exposed to WAN, making them accessible from the internet.
🏢 Internal Only: MEDIUM - Even without Remote Management, local network attackers can exploit these interfaces to gather sensitive network information.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires simple HTTP requests to exposed endpoints. No authentication required. Public research demonstrates the attack methodology.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2.6.5.102

Vendor Advisory: https://kb.netgear.com/000064866/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Orbi-Pro-WiFi-6-Systems-PSV-2021-0328

Restart Required: Yes

Instructions:

1. Log into the Orbi Pro admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install V2.6.5.102 or later. 4. The system will automatically restart after update.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevents WAN access to vulnerable interfaces while maintaining local network functionality.

Navigate to Advanced > Administration > Remote Management and disable the feature

Use Different Admin and WiFi Passwords

all

Mitigates the risk of complete compromise if attackers obtain WiFi passwords.

Change admin password to be different from WiFi passwords in the admin interface

🧯 If You Can't Patch

  • Disable Remote Management immediately to prevent internet-facing exposure
  • Implement network segmentation to isolate the Orbi Pro system from critical assets

🔍 How to Verify

Check if Vulnerable:

Check firmware version in admin interface under Advanced > Administration > Firmware Update. If version is below V2.6.5.102, system is vulnerable.

Check Version:

Check via web interface or SSH if enabled: show version

Verify Fix Applied:

Confirm firmware version is V2.6.5.102 or later in the admin interface. Test that /LocalClientList.asp and /wirelesssetup.asp endpoints now require authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to /LocalClientList.asp or /wirelesssetup.asp endpoints
  • Multiple failed authentication attempts followed by successful access to these endpoints

Network Indicators:

  • HTTP requests to vulnerable endpoints from unexpected IP addresses
  • Unusual traffic patterns to router admin interfaces

SIEM Query:

source="router_logs" AND (uri="/LocalClientList.asp" OR uri="/wirelesssetup.asp") AND auth_status="unauthenticated"

🔗 References

📤 Share & Export