Wednesday, December 18, 2024
HomeCVE/vulnerabilityNetgear Router Models With FunJSQ Let Attackers Execute Arbitrary Code

Netgear Router Models With FunJSQ Let Attackers Execute Arbitrary Code

Published on

SIEM as a Service

It has been discovered recently by the European security and compliance assessment company Onekey that arbitrary code may be injected into multiple Netgear router models through FunJSQ in a malicious manner.

In order to accelerate online games, Xiamen Xunwang Network Technology has developed a third-party module known as FunJSQ. In short, FunJSQ is a third-party gaming module.

Along with routers there are some Orbi WiFi Systems that are also affected. If your WiFi password is known to an attacker or your router’s Ethernet cable is connected to your computer, then this vulnerability is exploitable.

- Advertisement - SIEM as a Service

Affected Routers and WiFi Systems

Here below we have mentioned the all the router models and WiFi systems that are affected. Not only that even we have also mention their respective fixed firmware versions as well:-

Routers:-

  • R6230 fixed in firmware version 1.1.0.112
  • R6260 fixed in firmware version 1.1.0.88
  • R7000 fixed in firmware version 1.0.11.134
  • R8900 fixed in firmware version 1.0.5.42
  • R9000 fixed in firmware version 1.0.5.42
  • RAX120 fixed in firmware version 1.2.8.40
  • RAX120v2 fixed in firmware version 1.2.8.40
  • XR300 fixed in firmware version 1.0.3.72

Orbi WiFi Systems

  • RBR20 fixed in firmware version 2.7.2.26
  • RBR50 fixed in firmware version 2.7.4.26
  • RBS20 fixed in firmware version 2.7.2.26
  • RBS50 fixed in firmware version 2.7.4.26

A first set of patches was issued by Netgear for the vulnerable devices this month after they were informed of the security holes in June.

Illicit Actions

The FunJSQ gaming module does not have a secure update process. Update packages that are sent from the server to the FunJSQ module are only superficially checked.

A hash checksum is used to validate the packages on the device as they are unsigned.

There are a number of actions that an attacker can take in order to exploit an insecure communication channel, such as:-

  • The data that has been returned from the server can be tampered with.
  • A package can be extracted with elevated privileges from its contents and placed in the root folder.
  • It is possible to overwrite anything on the device by taking control of the update package.

There is a potential for arbitrary code to be executed from the WAN interface as a result of these factors combined.

CVE-2022-40620 has been assigned to the issue relating to an insecure update mechanism introduced in the release. CVE-2022-40619 was the CVE ID number assigned to the flaw related to unauthenticated command injections.

Download the Latest Firmware

  • To begin with, you will need to visit the NETGEAR Support page.
  • In the search box, you will need to enter your model number.
  • Once the drop-down menu appears, you can select the model you are looking for from it.
  • After that, click on the Downloads tab.
  • If the title of your first download starts with the firmware version under Current Versions, then pick that one.
  • The next thing you need to do is click the Release Notes button.
  • For instructions on downloading and installing the new firmware, please refer to the firmware release notes.

It should be noted that Netgear has not yet divulged a workaround for this vulnerability. The latest firmware from NETGEAR should be downloaded as soon as possible, as NETGEAR strongly recommends you do so.

Download Free SWG – Secure Web Filtering – E-book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...