{"id":7846,"date":"2018-10-28T20:59:46","date_gmt":"2018-10-29T03:59:46","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=zerodays&p=7846"},"modified":"2023-02-06T13:45:14","modified_gmt":"2023-02-06T20:45:14","slug":"cve-2016-11014-netgear","status":"publish","type":"zerodays","link":"https:\/\/webdev.securin.xyz\/zerodays\/cve-2016-11014-netgear\/","title":{"rendered":"CVE-2016-11014 – Authentication Bypass in Netgear Router"},"content":{"rendered":"

An authentication bypass vulnerability was identified on the Netgear JNR1010 devices before 1.0.0.32 which had\u00a0incorrect access control because the ok value of the auth cookie is a special case that allows remote attackers to bypass authentication mechanisms via unspecified vectors.<\/p>\n","protected":false},"featured_media":7841,"parent":0,"menu_order":0,"template":"","vulnerability_categories":[],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7846"}],"collection":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays"}],"about":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/types\/zerodays"}],"version-history":[{"count":4,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7846\/revisions"}],"predecessor-version":[{"id":13702,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7846\/revisions\/13702"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media\/7841"}],"wp:attachment":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media?parent=7846"}],"wp:term":[{"taxonomy":"vulnerability_categories","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/vulnerability_categories?post=7846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}