### [CVE-2021-20169](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20169) ![](https://img.shields.io/static/v1?label=Product&message=Netgear%20RAX43&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.0.3.96%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Access%20Controls&color=brightgreen) ### Description Netgear RAX43 version 1.0.3.96 does not utilize secure communications to the web interface. By default, all communication to/from the device is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext. ### POC #### Reference - https://www.tenable.com/security/research/tra-2021-55 #### Github No PoCs found on GitHub currently.