kamrananvaar
FULL MEMBER
- Joined
- Dec 2, 2011
- Messages
- 698
- Reaction score
- 1
Anyone can exploit the flaw after the exploit code was published.
By Zack Whittaker for Zero Day | December 9, 2016 -- 19:11 GMT (03:11 GMT+08:00) | Topic: Security
Two leading Netgear routers are vulnerable to a severe security flaw.
(Image: Netgear)
An advisory posted on Friday in Carnegie Mellon University's public vulnerability database (CERT) said that Netgear's R7000 and R6400 routers, running current and recent firmware respectively, are vulnerable to an arbitrary command injection flaw.
If exploited, the vulnerability could let an unauthenticated attacker run commands with root privileges.
The code to exploit the vulnerability -- effectively just a URL -- has been released publicly, allowing anyone to carry out attacks.
An attacker would have to trick a user into visiting a website that contains the code, such as an invisible web frame, to exploit the flaw. Adding commands to the router's IP address can open up ports on the router, such as Telnet.
The advisory said that other router models may be vulnerable.
CERT advised users to "strongly consider discontinuing use" of the devices until a fix is made available.
It's not clear how many users are affected by the flaw. A Netgear spokesperson did not respond to a request for comment at the time of writing.
Router flaws are increasingly being exploited by attackers, who use vulnerabilities to launch large-scale distributed denial-of-service (DDoS) attacks to flood and overload networks with traffic.
Last week, almost a million users across Europe were thrown off the internet after criminals tried to hijack home routers as part of a coordinated cyber attack.
By Zack Whittaker for Zero Day | December 9, 2016 -- 19:11 GMT (03:11 GMT+08:00) | Topic: Security
Two leading Netgear routers are vulnerable to a severe security flaw.
(Image: Netgear)
An advisory posted on Friday in Carnegie Mellon University's public vulnerability database (CERT) said that Netgear's R7000 and R6400 routers, running current and recent firmware respectively, are vulnerable to an arbitrary command injection flaw.
If exploited, the vulnerability could let an unauthenticated attacker run commands with root privileges.
The code to exploit the vulnerability -- effectively just a URL -- has been released publicly, allowing anyone to carry out attacks.
An attacker would have to trick a user into visiting a website that contains the code, such as an invisible web frame, to exploit the flaw. Adding commands to the router's IP address can open up ports on the router, such as Telnet.
The advisory said that other router models may be vulnerable.
CERT advised users to "strongly consider discontinuing use" of the devices until a fix is made available.
It's not clear how many users are affected by the flaw. A Netgear spokesperson did not respond to a request for comment at the time of writing.
Router flaws are increasingly being exploited by attackers, who use vulnerabilities to launch large-scale distributed denial-of-service (DDoS) attacks to flood and overload networks with traffic.
Last week, almost a million users across Europe were thrown off the internet after criminals tried to hijack home routers as part of a coordinated cyber attack.