ID

VAR-202601-1483


CVE

CVE-2026-0405


TITLE

of netgear CBR750  Authentication vulnerabilities in multiple products, including firmware

Trust: 0.8

sources: JVNDB: JVNDB-2026-003890

DESCRIPTION

An authentication bypass vulnerability in NETGEAR Orbi devices allows users connected to the local network to access the router web interface as an admin. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2026-0405 // JVNDB: JVNDB-2026-003890

AFFECTED PRODUCTS

vendor:netgearmodel:cbr750scope:ltversion:4.6.14.8

Trust: 1.0

vendor:netgearmodel:nbr750scope:ltversion:4.6.15.14

Trust: 1.0

vendor:netgearmodel:rbe970scope:ltversion:9.13.2.1

Trust: 1.0

vendor:netgearmodel:rbr750scope:ltversion:7.2.8.2

Trust: 1.0

vendor:netgearmodel:rbe372scope:ltversion:12.1.3.11

Trust: 1.0

vendor:netgearmodel:rbe771scope:ltversion:10.5.20.7

Trust: 1.0

vendor:netgearmodel:rbs860scope:ltversion:7.2.8.2

Trust: 1.0

vendor:netgearmodel:rbe370scope:ltversion:12.1.3.11

Trust: 1.0

vendor:netgearmodel:rbre960scope:ltversion:7.2.8.2

Trust: 1.0

vendor:netgearmodel:rbs850scope:ltversion:7.2.8.2

Trust: 1.0

vendor:netgearmodel:rbr860scope:ltversion:7.2.8.2

Trust: 1.0

vendor:netgearmodel:rbe773scope:ltversion:10.5.20.7

Trust: 1.0

vendor:netgearmodel:rbs840scope:ltversion:7.2.8.2

Trust: 1.0

vendor:netgearmodel:rbe373scope:ltversion:12.1.3.11

Trust: 1.0

vendor:netgearmodel:rbs750scope:ltversion:7.2.8.2

Trust: 1.0

vendor:netgearmodel:rbse960scope:ltversion:7.2.8.2

Trust: 1.0

vendor:netgearmodel:rbr840scope:ltversion:7.2.8.2

Trust: 1.0

vendor:netgearmodel:rbe770scope:ltversion:10.5.20.7

Trust: 1.0

vendor:netgearmodel:rbe971scope:ltversion:9.13.2.1

Trust: 1.0

vendor:netgearmodel:rbse950scope:ltversion:7.2.8.2

Trust: 1.0

vendor:netgearmodel:rbe374scope:ltversion:12.1.3.11

Trust: 1.0

vendor:netgearmodel:rbr850scope:ltversion:7.2.8.2

Trust: 1.0

vendor:netgearmodel:rbe772scope:ltversion:10.5.20.7

Trust: 1.0

vendor:netgearmodel:rbe371scope:ltversion:12.1.3.11

Trust: 1.0

vendor:netgearmodel:rbre950scope:ltversion:7.2.8.2

Trust: 1.0

vendor:ネットギアmodel:rbs840scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbe371scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbe771scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbe773scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbe373scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbse950scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbre950scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs860scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr860scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbse960scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr850scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbe772scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbs750scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbe970scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbe770scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr750scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:cbr750scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbr840scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbre960scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:nbr750scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbe372scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbe374scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbe370scope: - version: -

Trust: 0.8

vendor:ネットギアmodel:rbe971scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-003890 // NVD: CVE-2026-0405

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2026-0405
value: HIGH

Trust: 1.0

a2826606-91e7-4eb6-899e-8484bd4575d5: CVE-2026-0405
value: MEDIUM

Trust: 1.0

NVD: CVE-2026-0405
value: HIGH

Trust: 0.8

nvd@nist.gov: CVE-2026-0405
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2026-0405
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-003890 // NVD: CVE-2026-0405 // NVD: CVE-2026-0405

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.0

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Inappropriate authentication (CWE-287) [ others ]

Trust: 0.8

problemtype: Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-003890 // NVD: CVE-2026-0405

PATCH

title:January 2026 NETGEAR Security Advisory - NETGEAR Supporturl:https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory

Trust: 0.8

sources: JVNDB: JVNDB-2026-003890

EXTERNAL IDS

db:NVDid:CVE-2026-0405

Trust: 2.6

db:JVNDBid:JVNDB-2026-003890

Trust: 0.8

sources: JVNDB: JVNDB-2026-003890 // NVD: CVE-2026-0405

REFERENCES

url:https://www.netgear.com/support/product/rbe372

Trust: 1.8

url:https://www.netgear.com/support/product/rbe773

Trust: 1.8

url:https://www.netgear.com/support/product/rbe772

Trust: 1.8

url:https://www.netgear.com/support/product/rbse950

Trust: 1.8

url:https://www.netgear.com/support/product/cbr750

Trust: 1.8

url:https://www.netgear.com/support/product/rbe373

Trust: 1.8

url:https://www.netgear.com/support/product/rbr840

Trust: 1.8

url:https://www.netgear.com/support/product/rbr750

Trust: 1.8

url:https://www.netgear.com/support/product/nbr750

Trust: 1.8

url:https://www.netgear.com/support/product/rbs860

Trust: 1.8

url:https://www.netgear.com/support/product/rbs850

Trust: 1.8

url:https://www.netgear.com/support/product/rbe374

Trust: 1.8

url:https://www.netgear.com/support/product/rbre950

Trust: 1.8

url:https://www.netgear.com/support/product/rbe971

Trust: 1.8

url:https://www.netgear.com/support/product/rbe770

Trust: 1.8

url:https://www.netgear.com/support/product/rbs840

Trust: 1.8

url:https://www.netgear.com/support/product/rbe370

Trust: 1.8

url:https://www.netgear.com/support/product/rbr860

Trust: 1.8

url:https://www.netgear.com/support/product/rbre960

Trust: 1.8

url:https://www.netgear.com/support/product/rbe771

Trust: 1.8

url:https://www.netgear.com/support/product/rbse960

Trust: 1.8

url:https://www.netgear.com/support/product/rbs750

Trust: 1.8

url:https://www.netgear.com/support/product/rbe970

Trust: 1.8

url:https://www.netgear.com/support/product/rbe371

Trust: 1.8

url:https://www.netgear.com/support/product/rbr850

Trust: 1.8

url:https://kb.netgear.com/000070442/january-2026-netgear-security-advisory

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-0405

Trust: 0.8

sources: JVNDB: JVNDB-2026-003890 // NVD: CVE-2026-0405

SOURCES

db:JVNDBid:JVNDB-2026-003890
db:NVDid:CVE-2026-0405

LAST UPDATE DATE

2026-02-19T23:41:11.738000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-003890date:2026-02-17T07:26:00
db:NVDid:CVE-2026-0405date:2026-02-12T17:40:40.530

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-003890date:2026-02-17T00:00:00
db:NVDid:CVE-2026-0405date:2026-01-13T16:16:10.513