70+ Netgear Routers at Risk Due to New Zero-Day


Saturday, July 11th, 2020 |

A new zero-day vulnerability has been found to exist within 79 Netgear router models that allows an attacker to gain full control, remotely, over the affected device. Discovered simultaneously, and independently from one another, by Adam Nichols of the cybersecurity firm Grimm and d4rkn3ss of Vietnam’s VNPT ISC , the vulnerability itself lies in the HTTPD daemon used to manage the router.

According to reports released by Mr. Nichols, the vulnerability in the HTTPD daemon is that it does not adequately check the length of data that is supplied by a user, allowing an attacker to create a buffer overflow when the data is copied to a fixed-length variable. This flaw would allow an attacker to create a specially crafted string that would execute commands on the router without first needing to authenticate. According to Mr. Nichols, stack cookies would typically prevent this vulnerability, and in fact, stack cookies are widely utilized throughout the industry but unfortunately, they are not utilized properly within many of Netgear’s routers. In a proof of concept, Mr. Nichols was able to configure the telnet daemon on a vulnerable router to listen on port 8888 and not require a password.


Typically, the HTTPD daemon is only accessible from the local area network but router admins can enable it to be accessible from the wider Internet. Even if it is not accessible from the Internet, attackers can create spoofed websites that contain malicious JavaScript that can perform ‘DNS rebinding’ attacks to execute commands on the internal network remotely. In short, once an attacker gains control over a vulnerable router, they can use it to launch attacks on internal computer found on the local network. It can also be used to configure port forwarding on the router so that devices on the internal network would be exposed on the Internet.


Originally reported to Netgear in January of 2020, it is unknown if the vulnerability has since been patched or if remediation is possible. According to Mr. Nichols, 79 Netgear router models and 758 firmware images contain the vulnerable HTTPD daemon. For a full list of the 79 affected models, please see below, and for a full list of the 758 affected firmware images, they can be found, along with Nichols’ proof of concept, here.

Affected Router Models:

AC1450MBR1516WGR614v9
D6220MBRN3000WGR614v10
D6300MVBR1210CWGT624v4
D6400R4500WN2500RP
D7000v2R6200WN2500RPv2
D8500R6200v2WN3000RP
DC112AR6250WN3100RP
DGN2200R6300WN3500RP
DGN2200v4R6300v2WNCE3001
DGN2200MR6400WNDR3300
DGND3700R6400v2WNDR3300v2
EX3700R6700WNDR3400
EX3800R6700v3WNDR3400v2
EX3920R6900WNDR3400v3
EX6000R6900PWNDR3700v3
EX6100R7000WNDR4000
EX6120R7000PWNDR4500
EX6130R7100LGWNDR4500v2
EX6150R7300WNR834Bv2
EX6200R7850WNR1000v3
EX6920R7900WNR2000v2
EX7000R8000WNR3500
LG2200DR8300WNR3500v2
MBM621R8500WNR3500L
MBR624GURS400WNR3500Lv2
MBR1200WGR614v8XR300
MBR1515 

Sources:

Share this: