An exploitable firmware modification vulnerability exists on the Netgear XWN5001 Powerline 500 WiFi Access Point. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing malicious users to execute arbitrary code or cause a Denial of Service (DoS). This affects v0.4.1.1 and previous versions.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
netgear xwn5001_firmware |