


Perceptive Security
SOC/SIEM Consultancy

Netis E1+ 1.2.32533 contains an information disclosure vulnerability that allows unauthenticated attackers to retrieve WiFi passwords through the netcore_get.cg…
Published:
2 February 2026 at 23:00:00
Alert date:
3 February 2026 at 23:08:48
Source:
nvd.nist.gov
Mobile & IoT, Network Infrastructure
CVE-2020-37093 affects Netis E1+ router version 1.2.32533, allowing unauthenticated attackers to retrieve WiFi passwords and network credentials through the netcore_get.cgi endpoint. The vulnerability enables attackers to send GET requests to extract sensitive information including SSID and WiFi passwords in plain text format. This represents a critical information disclosure flaw that compromises wireless network security without requiring authentication. The vulnerability has been documented with proof-of-concept exploits available on Exploit-DB. Network administrators should update affected Netis E1+ devices immediately to prevent unauthorized access to wireless credentials.
Technical details
Mitigation steps:
Affected products:
Netis E1+
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2020-37093
http://www.netis-systems.com
https://www.exploit-db.com/exploits/48384
https://www.vulncheck.com/advisories/netis-e-unauthenticated-wifi-password-leak
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
