### [CVE-2016-5649](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5649) ![](https://img.shields.io/static/v1?label=Product&message=DGN2200&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=DGND3700&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=DGN2200-V1.0.0.50_7.0.50DGN2200-V1.0.0.50_7.0.50%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=DGND3700-V1.0.0.17_1.0.17DGND3700-V1.0.0.17_1.0.17%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-319&color=brighgreen) ### Description A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface. ### POC #### Reference - http://packetstormsecurity.com/files/152675/Netgear-DGN2200-DGND3700-Admin-Password-Disclosure.html - https://packetstormsecurity.com/files/140342/Netgear-DGN2200-DGND3700-WNDR4500-Information-Disclosure.html #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates