CVE-2022-25214
📋 TL;DR
This vulnerability allows unauthenticated remote attackers to access sensitive network information and wireless passwords through exposed web interfaces. It affects NETGEAR Orbi Pro WiFi 6 (SXK80) systems with Remote Management enabled. Attackers can obtain device IP/MAC addresses and WPA passphrases for both 2.4GHz and 5.0GHz networks.
💻 Affected Systems
- NETGEAR Orbi Pro WiFi 6 (SXK80)
📦 What is this software?
K2 Firmware by Phicomm
K3 Firmware by Phicomm
⚠️ Risk & Real-World Impact
Worst Case
Complete network compromise including administrative access if users selected the same password for WiFi and admin interface, allowing attackers to join the network and potentially access other connected devices.
Likely Case
Unauthorized network access and device enumeration, enabling attackers to map the network, identify targets, and potentially launch further attacks against connected devices.
If Mitigated
Limited information disclosure if Remote Management is disabled, though local network attackers could still exploit the vulnerability.
🎯 Exploit Status
Exploitation requires simple HTTP requests to exposed endpoints. No authentication required. Public research demonstrates the attack methodology.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V2.6.5.102
Vendor Advisory: https://kb.netgear.com/000064866/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Orbi-Pro-WiFi-6-Systems-PSV-2021-0328
Restart Required: Yes
Instructions:
1. Log into the Orbi Pro admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install V2.6.5.102 or later. 4. The system will automatically restart after update.
🔧 Temporary Workarounds
Disable Remote Management
allPrevents WAN access to vulnerable interfaces while maintaining local network functionality.
Navigate to Advanced > Administration > Remote Management and disable the feature
Use Different Admin and WiFi Passwords
allMitigates the risk of complete compromise if attackers obtain WiFi passwords.
Change admin password to be different from WiFi passwords in the admin interface
🧯 If You Can't Patch
- Disable Remote Management immediately to prevent internet-facing exposure
- Implement network segmentation to isolate the Orbi Pro system from critical assets
🔍 How to Verify
Check if Vulnerable:
Check firmware version in admin interface under Advanced > Administration > Firmware Update. If version is below V2.6.5.102, system is vulnerable.
Check Version:
Check via web interface or SSH if enabled: show version
Verify Fix Applied:
Confirm firmware version is V2.6.5.102 or later in the admin interface. Test that /LocalClientList.asp and /wirelesssetup.asp endpoints now require authentication.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated access to /LocalClientList.asp or /wirelesssetup.asp endpoints
- Multiple failed authentication attempts followed by successful access to these endpoints
Network Indicators:
- HTTP requests to vulnerable endpoints from unexpected IP addresses
- Unusual traffic patterns to router admin interfaces
SIEM Query:
source="router_logs" AND (uri="/LocalClientList.asp" OR uri="/wirelesssetup.asp") AND auth_status="unauthenticated"