7.8
HIGH CVSS 3.1
CVE-2026-0405
Authentication Bypass in NETGEAR Orbi Devices
Description

An authentication bypass vulnerability in NETGEAR Orbi devices allows users connected to the local network to access the router web interface as an admin.

INFO

Published Date :

Jan. 13, 2026, 4:16 p.m.

Last Modified :

Feb. 12, 2026, 5:40 p.m.

Remotely Exploit :

No

Source :

a2826606-91e7-4eb6-899e-8484bd4575d5
Affected Products

The following products are affected by CVE-2026-0405 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Netgear rbr750_firmware
2 Netgear rbs750_firmware
3 Netgear rbr850_firmware
4 Netgear rbs850_firmware
5 Netgear rbr840_firmware
6 Netgear rbs840_firmware
7 Netgear cbr750_firmware
8 Netgear rbre960_firmware
9 Netgear rbse960_firmware
10 Netgear rbr750
11 Netgear rbs750
12 Netgear rbr850
13 Netgear rbs850
14 Netgear rbr840
15 Netgear rbs840
16 Netgear cbr750
17 Netgear rbre960
18 Netgear rbse960
19 Netgear rbr860_firmware
20 Netgear rbr860
21 Netgear rbs860_firmware
22 Netgear rbs860
23 Netgear rbre950_firmware
24 Netgear rbre950
25 Netgear rbse950_firmware
26 Netgear rbse950
27 Netgear nbr750_firmware
28 Netgear nbr750
29 Netgear rbe370_firmware
30 Netgear rbe370
31 Netgear rbe371_firmware
32 Netgear rbe371
33 Netgear rbe372_firmware
34 Netgear rbe372
35 Netgear rbe373_firmware
36 Netgear rbe373
37 Netgear rbe374_firmware
38 Netgear rbe374
39 Netgear rbe770_firmware
40 Netgear rbe770
41 Netgear rbe771_firmware
42 Netgear rbe771
43 Netgear rbe772_firmware
44 Netgear rbe772
45 Netgear rbe773_firmware
46 Netgear rbe773
47 Netgear rbe970_firmware
48 Netgear rbe970
49 Netgear rbe971_firmware
50 Netgear rbe971
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH [email protected]
CVSS 4.0 MEDIUM a2826606-91e7-4eb6-899e-8484bd4575d5
CVSS 4.0 MEDIUM a2826606-91e7-4eb6-899e-8484bd4575d5
Solution
Remediate authentication bypass by applying vendor updates.
  • Update NETGEAR Orbi devices to the latest firmware.
  • Change default administrator credentials.
  • Restrict local network access to critical devices.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2026-0405.

URL Resource
https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory Patch Vendor Advisory
https://www.netgear.com/support/product/cbr750 Patch Product
https://www.netgear.com/support/product/nbr750 Patch Product
https://www.netgear.com/support/product/rbe370 Patch Product
https://www.netgear.com/support/product/rbe371 Patch Product
https://www.netgear.com/support/product/rbe372 Patch Product
https://www.netgear.com/support/product/rbe373 Patch Product
https://www.netgear.com/support/product/rbe374 Patch Product
https://www.netgear.com/support/product/rbe770 Patch Product
https://www.netgear.com/support/product/rbe771 Patch Product
https://www.netgear.com/support/product/rbe772 Patch Product
https://www.netgear.com/support/product/rbe773 Patch Product
https://www.netgear.com/support/product/rbe970 Patch Product
https://www.netgear.com/support/product/rbe971 Patch Product
https://www.netgear.com/support/product/rbr750 Patch Product
https://www.netgear.com/support/product/rbr840 Patch Product
https://www.netgear.com/support/product/rbr850 Patch Product
https://www.netgear.com/support/product/rbr860 Patch Product
https://www.netgear.com/support/product/rbre950 Patch Product
https://www.netgear.com/support/product/rbre960 Patch Product
https://www.netgear.com/support/product/rbs750 Patch Product
https://www.netgear.com/support/product/rbs840 Patch Product
https://www.netgear.com/support/product/rbs850 Patch Product
https://www.netgear.com/support/product/rbs860 Patch Product
https://www.netgear.com/support/product/rbse950 Patch Product
https://www.netgear.com/support/product/rbse960 Patch Product
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-0405 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-0405 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2026-0405 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Feb. 12, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CWE NVD-CWE-noinfo
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:cbr750_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.6.14.8 OR cpe:2.3:h:netgear:cbr750:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:nbr750_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 4.6.15.14 OR cpe:2.3:h:netgear:nbr750:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbe370_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.1.3.11 OR cpe:2.3:h:netgear:rbe370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbe371_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.1.3.11 OR cpe:2.3:h:netgear:rbe371:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbe372_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.1.3.11 OR cpe:2.3:h:netgear:rbe372:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbe373_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.1.3.11 OR cpe:2.3:h:netgear:rbe373:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbe374_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 12.1.3.11 OR cpe:2.3:h:netgear:rbe374:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbe770_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 10.5.20.7 OR cpe:2.3:h:netgear:rbe770:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbe771_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 10.5.20.7 OR cpe:2.3:h:netgear:rbe771:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbe772_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 10.5.20.7 OR cpe:2.3:h:netgear:rbe772:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbe773_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 10.5.20.7 OR cpe:2.3:h:netgear:rbe773:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbe970_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 9.13.2.1 OR cpe:2.3:h:netgear:rbe970:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbe971_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 9.13.2.1 OR cpe:2.3:h:netgear:rbe971:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.2.8.2 OR cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbr840_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.2.8.2 OR cpe:2.3:h:netgear:rbr840:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.2.8.2 OR cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbr860_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.2.8.2 OR cpe:2.3:h:netgear:rbr860:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.2.8.2 OR cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbs840_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.2.8.2 OR cpe:2.3:h:netgear:rbs840:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.2.8.2 OR cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbs860_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.2.8.2 OR cpe:2.3:h:netgear:rbs860:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbre950_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.2.8.2 OR cpe:2.3:h:netgear:rbre950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbre960_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.2.8.2 OR cpe:2.3:h:netgear:rbre960:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbse950_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.2.8.2 OR cpe:2.3:h:netgear:rbse950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:netgear:rbse960_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 7.2.8.2 OR cpe:2.3:h:netgear:rbse960:-:*:*:*:*:*:*:*
    Added Reference Type Netgear, Inc.: https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory Types: Patch, Vendor Advisory
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/cbr750 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/nbr750 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbe370 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbe371 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbe372 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbe373 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbe374 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbe770 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbe771 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbe772 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbe773 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbe970 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbe971 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbr750 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbr840 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbr850 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbr860 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbre950 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbre960 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbs750 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbs840 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbs850 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbs860 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbse950 Types: Patch, Product
    Added Reference Type Netgear, Inc.: https://www.netgear.com/support/product/rbse960 Types: Patch, Product
  • CVE Modified by a2826606-91e7-4eb6-899e-8484bd4575d5

    Jan. 13, 2026

    Action Type Old Value New Value
    Added Reference https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory
  • New CVE Received by a2826606-91e7-4eb6-899e-8484bd4575d5

    Jan. 13, 2026

    Action Type Old Value New Value
    Added Description An authentication bypass vulnerability in NETGEAR Orbi devices allows users connected to the local network to access the router web interface as an admin.
    Added CVSS V4.0 AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber
    Added CWE CWE-287
    Added Reference https://www.netgear.com/support/product/cbr750
    Added Reference https://www.netgear.com/support/product/nbr750
    Added Reference https://www.netgear.com/support/product/rbe370
    Added Reference https://www.netgear.com/support/product/rbe371
    Added Reference https://www.netgear.com/support/product/rbe372
    Added Reference https://www.netgear.com/support/product/rbe373
    Added Reference https://www.netgear.com/support/product/rbe374
    Added Reference https://www.netgear.com/support/product/rbe770
    Added Reference https://www.netgear.com/support/product/rbe771
    Added Reference https://www.netgear.com/support/product/rbe772
    Added Reference https://www.netgear.com/support/product/rbe773
    Added Reference https://www.netgear.com/support/product/rbe970
    Added Reference https://www.netgear.com/support/product/rbe971
    Added Reference https://www.netgear.com/support/product/rbr750
    Added Reference https://www.netgear.com/support/product/rbr840
    Added Reference https://www.netgear.com/support/product/rbr850
    Added Reference https://www.netgear.com/support/product/rbr860
    Added Reference https://www.netgear.com/support/product/rbre950
    Added Reference https://www.netgear.com/support/product/rbre960
    Added Reference https://www.netgear.com/support/product/rbs750
    Added Reference https://www.netgear.com/support/product/rbs840
    Added Reference https://www.netgear.com/support/product/rbs850
    Added Reference https://www.netgear.com/support/product/rbs860
    Added Reference https://www.netgear.com/support/product/rbse950
    Added Reference https://www.netgear.com/support/product/rbse960
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 6.1
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Base CVSS Score: 7.8
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact