Netgear has addressed critical security vulnerabilities in several of its popular router models that could allow hackers to execute remote code without authentication.
If not resolved promptly, these vulnerabilities pose a significant risk to affected devices, potentially enabling malicious actors to compromise networks.
The vulnerability, rated as Critical with a CVSS score of 9.8, is classified as an unauthenticated Remote Code Execution (RCE) flaw.
Attackers exploiting this flaw can remotely execute arbitrary code on vulnerable devices, potentially gaining control over the router and access to sensitive network resources.
The impact of this vulnerability emphasizes the importance of keeping your Netgear device firmware up to date. The affected router models and their fixed firmware versions are:
Netgear has strongly recommended users to download and install these firmware updates immediately to secure their devices from potential exploits.
How to Update Your Firmware
Updating your Netgear router’s firmware is quick and essential to avoid security risks. Follow these steps to download and install the latest firmware:
Failure to update your device leaves it vulnerable to exploitation by cybercriminals. Netgear has made it clear that they are not responsible for damages resulting from unpatched devices.
The vulnerability was identified through Bugcrowd, a popular platform for crowdsourced security testing. The vulnerability’s CVSS vector details are as follows:
The severity of this issue makes it imperative for users to act quickly and follow best practices in keeping their network devices secure.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Palo Alto Networks has disclosed a medium-severity vulnerability (CVE-2025-0127) in its PAN-OS software, enabling authenticated…
Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal…
The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting…
Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass…
Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message traffic,…
The cyber threat landscape has witnessed remarkable adaptation from the notorious hacker collective known as…