{"uuid": "cc70aea5-63ed-42db-b907-56a25f9de158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41545", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7798", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-41545\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The administrative web interface of a Netgear C7800 Router running firmware version 6.01.07 (and possibly others) authenticates users via basic authentication, with an HTTP header containing a base64 value of the plaintext username and password. Because the web server also does not utilize transport security by default, this renders the administrative credentials vulnerable to eavesdropping by an adversary during every authenticated request made by a client to the router over a WLAN, or a LAN, should the adversary be able to perform a man-in-the-middle attack.\n\ud83d\udccf Published: 2025-02-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-17T16:18:48.779Z\n\ud83d\udd17 References:\n1. https://www.netgear.com/about/security/\n2. https://www.netgear.com/images/datasheet/networking/cablemodems/C7800.pdf\n3. https://seclists.org/fulldisclosure/2025/Feb/12", "creation_timestamp": "2025-03-17T16:47:35.000000Z"}