It has been discovered recently by the European security and compliance assessment company Onekey that arbitrary code may be injected into multiple Netgear router models through FunJSQ in a malicious manner.
In order to accelerate online games, Xiamen Xunwang Network Technology has developed a third-party module known as FunJSQ. In short, FunJSQ is a third-party gaming module.
Along with routers there are some Orbi WiFi Systems that are also affected. If your WiFi password is known to an attacker or your router’s Ethernet cable is connected to your computer, then this vulnerability is exploitable.
Affected Routers and WiFi Systems
Here below we have mentioned the all the router models and WiFi systems that are affected. Not only that even we have also mention their respective fixed firmware versions as well:-
Routers:-
- R6230 fixed in firmware version 1.1.0.112
- R6260 fixed in firmware version 1.1.0.88
- R7000 fixed in firmware version 1.0.11.134
- R8900 fixed in firmware version 1.0.5.42
- R9000 fixed in firmware version 1.0.5.42
- RAX120 fixed in firmware version 1.2.8.40
- RAX120v2 fixed in firmware version 1.2.8.40
- XR300 fixed in firmware version 1.0.3.72
Orbi WiFi Systems
- RBR20 fixed in firmware version 2.7.2.26
- RBR50 fixed in firmware version 2.7.4.26
- RBS20 fixed in firmware version 2.7.2.26
- RBS50 fixed in firmware version 2.7.4.26
A first set of patches was issued by Netgear for the vulnerable devices this month after they were informed of the security holes in June.
Illicit Actions
The FunJSQ gaming module does not have a secure update process. Update packages that are sent from the server to the FunJSQ module are only superficially checked.
A hash checksum is used to validate the packages on the device as they are unsigned.
There are a number of actions that an attacker can take in order to exploit an insecure communication channel, such as:-
- The data that has been returned from the server can be tampered with.
- A package can be extracted with elevated privileges from its contents and placed in the root folder.
- It is possible to overwrite anything on the device by taking control of the update package.
There is a potential for arbitrary code to be executed from the WAN interface as a result of these factors combined.
CVE-2022-40620 has been assigned to the issue relating to an insecure update mechanism introduced in the release. CVE-2022-40619 was the CVE ID number assigned to the flaw related to unauthenticated command injections.
Download the Latest Firmware
- To begin with, you will need to visit the NETGEAR Support page.
- In the search box, you will need to enter your model number.
- Once the drop-down menu appears, you can select the model you are looking for from it.
- After that, click on the Downloads tab.
- If the title of your first download starts with the firmware version under Current Versions, then pick that one.
- The next thing you need to do is click the Release Notes button.
- For instructions on downloading and installing the new firmware, please refer to the firmware release notes.
It should be noted that Netgear has not yet divulged a workaround for this vulnerability. The latest firmware from NETGEAR should be downloaded as soon as possible, as NETGEAR strongly recommends you do so.
Download Free SWG – Secure Web Filtering – E-book