CVE-2026-0405

7.8 HIGH

📋 TL;DR

An authentication bypass vulnerability in NETGEAR Orbi routers allows local network users to access the administrative web interface without credentials. This affects multiple Orbi models running vulnerable firmware versions. Attackers on the same network can gain full router control.

💻 Affected Systems

Products:
  • NETGEAR Orbi CBR750
  • NETGEAR Orbi NBR750
  • NETGEAR Orbi RBE370
  • NETGEAR Orbi RBE371
Versions: Specific vulnerable versions not specified in references; check NETGEAR advisory for exact ranges
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with default configurations; all local network interfaces are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing network traffic interception, DNS hijacking, credential theft, and installation of persistent malware on connected devices.

🟠

Likely Case

Unauthorized users changing router settings, redirecting traffic, or disabling security features.

🟢

If Mitigated

Limited impact if network segmentation isolates routers and strong perimeter controls prevent unauthorized local access.

🌐 Internet-Facing: LOW - The vulnerability requires local network access, not directly exploitable from the internet.
🏢 Internal Only: HIGH - Any device on the local network can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access and basic web requests; no special tools needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NETGEAR advisory for specific fixed firmware versions

Vendor Advisory: https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and apply latest firmware. 4. Reboot router after update completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate router management interface to trusted VLAN or separate network segment

Access Control Lists

all

Restrict access to router management IP addresses to authorized devices only

🧯 If You Can't Patch

  • Implement strict network segmentation to limit which devices can reach router management interface
  • Enable router logging and monitor for unauthorized access attempts to admin interface

🔍 How to Verify

Check if Vulnerable:

Attempt to access router web interface from local network without credentials; if admin access is granted, device is vulnerable.

Check Version:

Check router web interface under Advanced > Administration > Firmware Update for current version

Verify Fix Applied:

After patching, attempt same access test; should receive authentication prompt or be denied access.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to admin pages in router logs
  • Multiple failed login attempts followed by successful access without credentials

Network Indicators:

  • HTTP requests to router admin pages from unexpected internal IPs
  • Unusual traffic patterns to router management interface

SIEM Query:

source="router_logs" AND (url="*/admin/*" OR url="*/login/*") AND status=200 AND user="-"

🔗 References

📤 Share & Export