![]() However, in an effort to make its product safe, Netgear recently partnered up with Bugcrowd to launch a bug bounty program that can earn researchers cash rewards of up to $15,000 for finding and responsibly reporting flaws in its hardware, APIs, and the mobile apps. Just last month, the US-CERT advised users to stop using Netgear's R7000 and R6400 routers due to a serious bug that permitted command injection. This is the second time in around two months when researchers have discovered flaws in Netgear routers. Netgear has released firmware updates for all of its affected routers, and users are strongly advised to upgrade their devices. Kenin notified Netgear of the flaw, and the company confirmed the issue affects a large number of its products. Update the Firmware of your NETGEAR Router Now! I pushed the reset button, went through the set up wizard again and entered the new router password. Here's a list of affected Netgear routers: The SpiderLabs researcher stressed that the vulnerability is very serious as it affects a large number of Netgear router models. He has also released an exploit code for testing purpose, written in Python. Join our insightful webinar! Save My Seat!Īfter trying out his flaw on a range of Netgear routers, Kenin was surprised to know that more than ten thousand vulnerable devices used the flawed firmware and can be accessed remotely. Zero Trust + Deception: Learn How to Outsmart Attackers!ĭiscover how Deception can detect advanced threats, stop lateral movement, and enhance your Zero Trust strategy. ![]() If exploited by bad actors, the vulnerability that completely bypasses any password on a Netgear router could give hackers complete control of the affected router, including the ability to change its configuration, turn it into botnets or even upload entirely new firmware. This would include public Wi-Fi spaces like cafés and libraries using the vulnerable equipment." "However, anyone with physical access to a network with a vulnerable router can exploit it locally. By default this is not turned on," Kenin said. "The vulnerability can be used by a remote attacker if remote administration is set to be internet facing. While the router vendor claims the remote management option is turned off on its routers by default, according to the researcher, there are "hundreds of thousands, if not over a million" routers left remotely accessible. So, the researcher started looking for ways to hack his own router and found a couple of exploits from 2014 that he leveraged to discover this flaw which allowed him to query routers and retrieve their login credentials easily, giving him full access to the device.īut Kenin said the newly discovered flaw could be remotely exploited only if the router's remote management option is enabled.
0 Comments
Leave a Reply. |