Author Topic: US-CERT: Stop using your remotely exploitable Netgear routers  (Read 912 times)

0 Members and 1 Guest are viewing this topic.

Offline nincehelser

  • Forecaster
  • *****
  • Posts: 3337
US-CERT: Stop using your remotely exploitable Netgear routers
« on: December 11, 2016, 10:52:20 PM »
http://www.networkworld.com/article/3148771/security/us-cert-stop-using-your-remotely-exploitable-netgear-routers.html

Netgear R7000, firmware version 1.0.7.2_1.1.93 and possibly earlier, and R6400, firmware version 1.0.1.6_1.0.4 and possibly earlier, contain an arbitrary command injection vulnerability. By convincing a user to visit a specially crafted web site, a remote attacker may execute arbitrary commands with root privileges on affected routers.



This vulnerability has been confirmed in the R7000 and R6400 models. Community reports also indicate the R8000, firmware version 1.0.3.4_1.1.2, is vulnerable. Other models may also be affected.

Offline ValentineWeather

  • Forecaster
  • *****
  • Posts: 6377
    • Valentine Nebraska's Real-Time Weather
Re: US-CERT: Stop using your remotely exploitable Netgear routers
« Reply #1 on: December 11, 2016, 11:53:39 PM »
Randy

Offline BigOkie

  • Forecaster
  • *****
  • Posts: 1369
  • Tulsa, OK
    • KOKTULSA13
Re: US-CERT: Stop using your remotely exploitable Netgear routers
« Reply #2 on: December 12, 2016, 12:51:25 PM »
Not intending this to be a 'rip Netgear' thread but a Netgear was the very first router I bought back in the early 2000s.  I dumped it pretty quickly for one of the Linksys Blue Bricks and stayed with Linksys for a while until I now use the Asus routers which are top notch.
Current setup: Davis Vantage Pro 2 Plus Wireless
Weather radios:
Reecom R-1650
Sangean CL-100
Uniden Home Patrol I

Offline ValentineWeather

  • Forecaster
  • *****
  • Posts: 6377
    • Valentine Nebraska's Real-Time Weather
Re: US-CERT: Stop using your remotely exploitable Netgear routers
« Reply #3 on: December 19, 2016, 07:24:24 AM »
Patch is out just updated my R7000.
Randy