Researchers discovered unpatched zero-day vulnerability with 79 Netgear routers that allow attackers to take control over the device remotely.
The flaw allows attackers to run arbitrary code as “root” user and to take full control over the device remotely.
79 Netgear Routers Models Vulnerable
The vulnerabilities were discovered by two security researchers Adam Nichols from GRIMM and d4rkn3ss from Internet service provide VNPT.
Nicholas discovered that vulnerability could affect 758 different firmware versions that run on 79 Netgear routers. The firmware is released back in 2007.
According to the reports, the vulnerability resides HTTPD service that listens on TCP port 80 by default. The issue is due to improper validation of “user-supplied data before copying it to a fixed-length, stack-based buffer.”
The vulnerability allows hackers to execute arbitrary code on vulnerable devices as a root user. Authentication is not required to exploit this vulnerability.
Adam Nichols analyzed the vulnerability Netgear R7000 version 220.127.116.11 firmware and used the binwalk to extract the root filesystem from the firmware image.
The vulnerability can be exploitable only with the older versions, in modern software this vulnerability would be unexploitable as the modern software typically contains stack cookies.
Researchers also developed an exploit that served as a CSRF attack, “If a user with a vulnerable router browses to a malicious website, that website could exploit the user’s router.”
Routers and modems are the important security borders that prevent attacks from directly exploiting the computers in a network.
Affected router models;