• Hey, guest user. Hope you're enjoying NeoGAF! Have you considered registering for an account? Come join us and add your take to the daily discourse.

Netgear router security vulnerability

Status
Not open for further replies.

Chanser

Member
The critical bug allows remote attackers to inject highly privileged commands whenever anyone connected to the local Netgear network clicks on a malicious Web link, a researcher who uses the online handle Acew0rm reported on Friday. The link, which can be disguised to appear innocuous, then injects a command that routers run as root. The devices' failure to properly filter out input included in Web requests allows attackers to run powerful shell commands. Netgear R7000, R6400, and R8000 models have been confirmed to be vulnerable, and other models, including the R7000P, R7500, R7800, R8500 R9000, have been reported by end users as being affected.

A temporary fix is also possible. Ironically, it involves exploiting the vulnerability in a safe way to issue a command that turns off the router's Web server. The command can be issued by clicking on a simple link similar to this one (http://[router-address]/cgi-bin/;killall$IFS'httpd'), where [router-address] is replaced with the local IP address assigned to the router. While the command disables the internal Web the router uses to receive incoming commands, the router itself will otherwise continue to work normally. The temporary workaround is effective only until the router is restarted, because the Web server will be enabled each time the device is rebooted.

http://arstechnica.com/security/201...-hackers-to-seize-control-of-netgear-routers/

Beta firmware fix: http://kb.netgear.com/000036386/CVE-2016-582384
Sadly I own a R7000, applying beta firmware.
 
Status
Not open for further replies.
Top Bottom