CVE-2026-0405
Authentication Bypass in NETGEAR Orbi Devices
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
An authentication bypass vulnerability in NETGEAR Orbi devices allows users connected to the local network to access the router web interface as an admin.
| CWE | CWE-287 |
| Vendor | netgear |
| Product | rbe970 |
| Published | Jan 13, 2026 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for netgear rbe970
Be the first to know when new unknown vulnerabilities affecting netgear rbe970 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
NETGEAR / RBE970
0 < v9.13.2.1
NETGEAR / RBE971
0 < v9.13.2.1
NETGEAR / CBR750
0 < V4.6.14.8
NETGEAR / NBR750
0 < V4.6.15.14
NETGEAR / RBE770
0 < v10.5.20.7
NETGEAR / RBE771
0 < v10.5.20.7
NETGEAR / RBE772
0 < v10.5.20.7
NETGEAR / RBE773
0 < v10.5.20.7
NETGEAR / RBR750
0 < v7.2.8.2
NETGEAR / RBS750
0 < v7.2.8.2
NETGEAR / RBR840
0 < v7.2.8.2
NETGEAR / RBS840
0 < v7.2.8.2
NETGEAR / RBR850
0 < v7.2.8.2
NETGEAR / RBS850
0 < v7.2.8.2
NETGEAR / RBR860
0 < v7.2.8.2
NETGEAR / RBS860
0 < v7.2.8.2
NETGEAR / RBRE950
0 < v7.2.8.2
NETGEAR / RBSE950
0 < v7.2.8.2
NETGEAR / RBRE960
0 < v7.2.8.2
NETGEAR / RBSE960
0 < v7.2.8.2
NETGEAR / RBE370
0 < v12.1.3.11
NETGEAR / RBE371
0 < v12.1.3.11
NETGEAR / RBE372
0 < v12.1.3.11
NETGEAR / RBE373
0 < v12.1.3.11
NETGEAR / RBE374
0 < v12.1.3.11
References
netgear.com: https://www.netgear.com/support/product/rbe971 netgear.com: https://www.netgear.com/support/product/rbe970 netgear.com: https://www.netgear.com/support/product/cbr750 netgear.com: https://www.netgear.com/support/product/nbr750 netgear.com: https://www.netgear.com/support/product/rbe770 netgear.com: https://www.netgear.com/support/product/rbe771 netgear.com: https://www.netgear.com/support/product/rbe772 netgear.com: https://www.netgear.com/support/product/rbe773 netgear.com: https://www.netgear.com/support/product/rbr750 netgear.com: https://www.netgear.com/support/product/rbs750 netgear.com: https://www.netgear.com/support/product/rbr840 netgear.com: https://www.netgear.com/support/product/rbs840 netgear.com: https://www.netgear.com/support/product/rbr850 netgear.com: https://www.netgear.com/support/product/rbs850 netgear.com: https://www.netgear.com/support/product/rbr860 netgear.com: https://www.netgear.com/support/product/rbs860 netgear.com: https://www.netgear.com/support/product/rbre950 netgear.com: https://www.netgear.com/support/product/rbse950 netgear.com: https://www.netgear.com/support/product/rbre960 netgear.com: https://www.netgear.com/support/product/rbse960 netgear.com: https://www.netgear.com/support/product/rbe370 netgear.com: https://www.netgear.com/support/product/rbe371 netgear.com: https://www.netgear.com/support/product/rbe372 netgear.com: https://www.netgear.com/support/product/rbe373 netgear.com: https://www.netgear.com/support/product/rbe374 kb.netgear.com: https://kb.netgear.com/000070442/January-2026-NETGEAR-Security-Advisory
Credits
Fulaige