Security for everyone

CVE-2017-5521 Scanner

Detects 'Information Disclosure' vulnerability in Various Netgear Router Models.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one




Netgear is a popular brand of networking devices that provides routers for home and office use. These routers are designed to provide users with a fast, reliable, and secure connection to the internet. The Various Netgear Router Models are used to distribute internet connectivity to all connected devices, such as computers, tablets, smartphones, and gaming consoles. These routers offer advanced features such as parental control, firewall protection, and remote management for ease of management.

CVE-2017-5521 is a vulnerability that has been detected in these NETGEAR router and vesions;

  • AC1450 V1.0.0.34_10.0.16
  • AC1450 V1.0.0.22_1.0.10
  • AC1450 V1.0.0.14_1.0.6
  • D6400 V1.0.0.44_1.0.44 (V1.0.0.52_1.0.52 and above not affected)
  • D6400 V1.0.0.34_1.3.34
  • D6400 V1.0.0.38_1.1.38
  • D6400 V1.0.0.22_1.0.22
  • DC112A V1.0.0.30_1.0.60
  • DGN2200v4 V1.0.0.24_5.0.8 (V1.0.0.66_1.0.66 is not affected)
  • JNDR3000 V1.0.0.18_1.0.16
  • R6200 V1.0.1.48_1.0.37 (V1.0.1.52_1.0.41 and above are not affected)
  • R6200v2 V1.0.1.20_1.0.18 (V1.0.3.10_10.1.10 is not affected)
  • R6250 V1.0.1.84_1.0.78 (V1.0.4.2_10.1.10 is not affected)
  • R6300    V1.0.2.78_1.0.58
  • R6300v2 V1.0.4.2_10.0.74 (V1.0.4.6_10.0.76 is patched)
  • R6300v2 V1.0.3.30_10.0.73
  • R6700 V1.0.1.14_10.0.29
  • R6700 V1.0.0.26_10.0.26
  • R6700 V1.0.0.24_10.0.18
  • R6900 V1.0.0.4_1.0.10
  • R7000 V1.0.6.28_1.1.83 (V1.0.7.2_1.1.93 is patched)
  • R8300 V1.0.2.48_1.0.52
  • R8500 V1.0.2.30_1.0.43 (V1.0.2.64_1.0.62 and above is patched)
  • R8500 V1.0.2.26_1.0.41
  • R8500 V1.0.0.56_1.0.28
  • R8500 V1.0.0.20_1.0.11
  • VEGN2610 V1.0.0.35_1.0.35
  • VEGN2610 V1.0.0.29_1.0.29
  • VEGN2610 V1.0.0.27_1.0.27
  • WNDR3400v2 V1.0.0.16_1.0.34 (V1.0.0.52_1.0.81 is not affected)
  • WNDR3400v3 V1.0.0.22_1.0.29 (V1.0.1.2_1.0.51 is not affected)
  • WNDR3700v3 V1.0.0.38_1.0.31
  • WNDR4000 V1.0.2.4_9.1.86
  • WNDR4500 V1.0.1.40_1.0.68
  • WNDR4500v2 V1.0.0.60_1.0.38
  • WNDR4500v2 V1.0.0.42_1.0.25
  • WGR614v10 V1.0.2.60_60.0.85NA
  • WGR614v10 V1.0.2.58_60.0.84NA
  • WGR614v10 V1.0.2.54_60.0.82NA
  • WN3100RP V1.0.0.14_1.0.19
  • WN3100RP V1.0.0.6_1.0.12

This vulnerability can lead to password disclosure via simple crafted requests to the web management server. The flaw is prone to exploit remotely if the remote management option is set, and can also be exploited given access to the router over LAN or WLAN. When an unauthorized user is trying to access the web panel, they are asked to authenticate; if the authentication is canceled and password recovery is not enabled, the user is redirected to a page that exposes a password recovery token.

Exploiting CVE-2017-5521 can lead to a critical security breach as it can reveal admin-level access to the router settings, including changing the router’s password, accessing the connected devices’ data, and redirecting traffic to an unsecured website. An attacker can easily take control of the router by gaining full access to it through manipulating router’s settings. This can result in data theft, malware attacks, and even spying on the user’s activities online.

In conclusion, understanding the importance of securing our digital assets is crucial in today’s tech-driven world. platform provides an easy and quick way to stay aware of the vulnerabilities in your digital assets. Using their pro features, readers can easily scan their assets, identify weak points, and take steps to secure their networks. By staying informed and taking necessary precautions, we can ensure our online security and privacy.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture