top of page
perceptive_background_267k.jpg

Netis E1+ 1.2.32533 contains an information disclosure vulnerability that allows unauthenticated attackers to retrieve WiFi passwords through the netcore_get.cg…

Published:

2 February 2026 at 23:00:00

Alert date:

3 February 2026 at 23:08:48

Source:

nvd.nist.gov

Click to open the original link from this advisory

Mobile & IoT, Network Infrastructure

CVE-2020-37093 affects Netis E1+ router version 1.2.32533, allowing unauthenticated attackers to retrieve WiFi passwords and network credentials through the netcore_get.cgi endpoint. The vulnerability enables attackers to send GET requests to extract sensitive information including SSID and WiFi passwords in plain text format. This represents a critical information disclosure flaw that compromises wireless network security without requiring authentication. The vulnerability has been documented with proof-of-concept exploits available on Exploit-DB. Network administrators should update affected Netis E1+ devices immediately to prevent unauthorized access to wireless credentials.

Technical details

Mitigation steps:

Affected products:

Netis E1+

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page