Uncategorized

Critical RCE Flaw in the core Netgear Firmware Let Remote Attackers to Take Control of an Affected System

The cybersecurity organization GRIMM has recently announced vulnerability research towards a series of Netgear SOHO devices. The vulnerability that has been discovered generally enables remote code execution (RCE) as root and lets attackers take control of an affected system. 

This vulnerability isn’t a typical router vulnerability, in this kind of vulnerability the actual source is being located within a third-party element that is specifically involved in the firmware of many Netgear devices.

Exploit

After detecting the vulnerability, the experts also came to know that this security flaw can be exploited by toiling a malicious database update. And for better understanding, they have applied this process that included Proof of Concept (POC).

The PoC was produced for and examined against the Netgear R7000. However, a fake Domain Name System (DNS) server is being operated and configured so that it can respond to requests from the router along with the IP address of a MitM server. 

In case the router gets the malicious DNS response before the one that is valid, the router will soon get correlate to the MitM server rather than Netgear’s update server. So, any type of MitM attack can easily exploit this kind of vulnerability.

Old Tar and Testing

However, in this vulnerability, there is an R7000’s tar utility that originally belongs from busybox version 1.7.2, and it was initially released in September 2007. 

The very known issue that generally occurs in the old versions of tar is that they do not reliably account for files that are included in tarballs with absolute paths.

Well in the case of testing, the shell script, create.sh, has been implemented to create a malicious database tarball, and once it’s been created it gets associated to circleinfo.txt file for the R7000. 

After being generated, all of these files will require to be served through a MitM attack on the device. Among all, the most easiest method to test the MitM attack is through DNS spoofing. 

What’s going on?

This vulnerability is named CVE-2021-40847, and there was a Circle update daemon, or mini-program, called “circled” that is present in this vulnerability.

After detecting this vulnerability, it was discovered that the Circle update daemon operated as root, and it was allowed by default and it can be easily gets exploited even if it gets disabled.

Impact

The impact of this vulnerability is quite huge, and it exists in the Circle Parental Control Service update daemon, which generally gets enabled by default. 

Not only this but also the Netgear devices that have not been configured till now use the Circle parental control characteristic and they are still vulnerable to this exploit.

Affected Devices

Here’s the list of affected devices mentioned below:-

  • R6400v2 – 1.0.4.106
  • R6700 – 1.0.2.16
  • R6700v3 – 1.0.4.106
  • R6900 – 1.0.2.16
  • R6900P – 1.3.2.134
  • R7000 – 1.0.11.123
  • R7000P – 1.3.2.134
  • R7850 – 1.0.5.68
  • R7900 – 1.0.4.38
  • R8000 – 1.0.4.68
  • RS400 – 1.5.0.68

These kinds of vulnerabilities are quite crucial, as the exploitation of this vulnerability enables attackers on the same network as one of these devices so that they can able to intercept the router’s network traffic. As they have the motive to get RCE as root on the router.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical vulnerability…

7 hours ago

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to masquerade…

12 hours ago

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message circulating…

13 hours ago

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers. By leveraging compromised…

13 hours ago

Critical SUSE Linux Distro Injection Vulnerability Allow Attackers Exploits “go-git” Library

A significant security vulnerability, designated CVE-2025-21613, has been discovered in the go-git library, used for…

13 hours ago

Apache CXF Vulnerability Triggers DoS Attack

Colm O hEigeartaigh announced a critical vulnerability affecting various versions of Apache CXF, a widely-used…

13 hours ago