Vulnerability Details CVE-2021-20168
Netgear RAX43 version 1.0.3.96 does not have sufficient protections to the UART interface. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user. These default credentials are admin:admin.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 16.0%
CVSS Severity
CVSS v3 Score 6.8
CVSS v2 Score 7.2
Products affected by CVE-2021-20168
-
cpe:2.3:h:netgear:rax43:-
-
cpe:2.3:o:netgear:rax43_firmware:1.0.3.96