Sunday, January 19, 2025
HomeCVE/vulnerabilityNetgear Router Models With FunJSQ Let Attackers Execute Arbitrary Code

Netgear Router Models With FunJSQ Let Attackers Execute Arbitrary Code

Published on

SIEM as a Service

Follow Us on Google News

It has been discovered recently by the European security and compliance assessment company Onekey that arbitrary code may be injected into multiple Netgear router models through FunJSQ in a malicious manner.

In order to accelerate online games, Xiamen Xunwang Network Technology has developed a third-party module known as FunJSQ. In short, FunJSQ is a third-party gaming module.

Along with routers there are some Orbi WiFi Systems that are also affected. If your WiFi password is known to an attacker or your router’s Ethernet cable is connected to your computer, then this vulnerability is exploitable.

Affected Routers and WiFi Systems

Here below we have mentioned the all the router models and WiFi systems that are affected. Not only that even we have also mention their respective fixed firmware versions as well:-

Routers:-

  • R6230 fixed in firmware version 1.1.0.112
  • R6260 fixed in firmware version 1.1.0.88
  • R7000 fixed in firmware version 1.0.11.134
  • R8900 fixed in firmware version 1.0.5.42
  • R9000 fixed in firmware version 1.0.5.42
  • RAX120 fixed in firmware version 1.2.8.40
  • RAX120v2 fixed in firmware version 1.2.8.40
  • XR300 fixed in firmware version 1.0.3.72

Orbi WiFi Systems

  • RBR20 fixed in firmware version 2.7.2.26
  • RBR50 fixed in firmware version 2.7.4.26
  • RBS20 fixed in firmware version 2.7.2.26
  • RBS50 fixed in firmware version 2.7.4.26

A first set of patches was issued by Netgear for the vulnerable devices this month after they were informed of the security holes in June.

Illicit Actions

The FunJSQ gaming module does not have a secure update process. Update packages that are sent from the server to the FunJSQ module are only superficially checked.

A hash checksum is used to validate the packages on the device as they are unsigned.

There are a number of actions that an attacker can take in order to exploit an insecure communication channel, such as:-

  • The data that has been returned from the server can be tampered with.
  • A package can be extracted with elevated privileges from its contents and placed in the root folder.
  • It is possible to overwrite anything on the device by taking control of the update package.

There is a potential for arbitrary code to be executed from the WAN interface as a result of these factors combined.

CVE-2022-40620 has been assigned to the issue relating to an insecure update mechanism introduced in the release. CVE-2022-40619 was the CVE ID number assigned to the flaw related to unauthenticated command injections.

Download the Latest Firmware

  • To begin with, you will need to visit the NETGEAR Support page.
  • In the search box, you will need to enter your model number.
  • Once the drop-down menu appears, you can select the model you are looking for from it.
  • After that, click on the Downloads tab.
  • If the title of your first download starts with the firmware version under Current Versions, then pick that one.
  • The next thing you need to do is click the Release Notes button.
  • For instructions on downloading and installing the new firmware, please refer to the firmware release notes.

It should be noted that Netgear has not yet divulged a workaround for this vulnerability. The latest firmware from NETGEAR should be downloaded as soon as possible, as NETGEAR strongly recommends you do so.

Download Free SWG – Secure Web Filtering – E-book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured...

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....