Firmware Flaw Leaves Netgear Routers Vulnerable To Hacker Takover

Netgear R7000, R6400 and R8000 routers have been found to contain a flaw that could enable them to be exploited and taken over by hackers and cyber criminals.

Through exploiting a command injection flaw would -be hackers can execute arbitrary code on the router’s firmware and wreak havoc with the user’s network.

Netgear security flaw

Twitter user Acew0rm1 was responsible for finding the flaw but had shed little light yet on how the vulnerability was discovered.

Netgear said it is investigation the flaw but has yet to reveal much in the way it plans to fix the flaw or rollout a firmware update to seal the security hole.

“Netgear has recently become aware of the security issue #582384 that allows unauthenticated web pages to pass form input directly to the command-line interface. A remote attacker can potentially inject arbitrary commands which are then executed by the system,” the company said.

Given no list of vulnerable router models has been put out in circulation, it is difficult for users of Netgear users to understand what to do next to bypass the problem.

The computer emergency response team (CERT) has advised people with Netgear routers to stop using the device until more security details are revealed and the company moves to fix the flaw.

“Exploiting this vulnerability is trivial. Users who have the option of doing so should strongly consider discontinuing use of affected devices until a fix is made available,” CERT said.

Such flaws in routers are particularly dangerous and no only do they expose a network to being taken over but hacked routers and also be used to form a botnet with other seized devices from which distributed denial of service (DDoS) attacks can be launched from, as seen with the Mirai bot net, as well as help spread malware.

The Mirai botnet appears to have been responsible for such DDoS attacks as the one aimed at Talk Talk and the Post Office which took down the companies’ broadband services, as well as flatten services such as Twitter and Spotify when it was used to knock out DNS servers supporting the popular web services.

As the spread of the Internet of Things (IoT) gathers pace, such vulnerabilities at the firmware level in hardware are likely to crop up more regularly unless action on encryption standards and certification are established before the spread of such connected devices become more pervasive.

Are you a security pro? Try our quiz!

Roland Moore-Colyer

As News Editor of Silicon UK, Roland keeps a keen eye on the daily tech news coverage for the site, while also focusing on stories around cyber security, public sector IT, innovation, AI, and gadgets.

Recent Posts

OpenAI Hit By Austrian Complaint Over ChatGPT ‘False Data’

Rights group argues ChatGPT tendency to generate false information on individuals violates GDPR data protection…

5 hours ago

EU Designates Apple’s iPad OS As DMA ‘Gatekeeper’

European Commission says Apple's iPadOS is 'gatekeeper' due to large number of businesses 'locked in'…

5 hours ago

Beating the Barbarians in the Cloud

As the cloud continues to be an essential asset for all businesses, developing and maintaining…

5 hours ago

Austria Conference Calls For Controls On ‘Killer Robots’

Internatinal conference in Vienna calls for controls on AI-powered autonomous weapons to ensure humans remain…

6 hours ago

Taiwanese Chip Giant Exits China Mainland

Major Taiwan chip assembly and test firm KYEC to sell Jiangsu subsidiary, exit mainland China…

7 hours ago

Deepfakes: More Than Skin Deep Security

As deepfake technology continues to blur the lines between reality and deception, businesses and individuals…

7 hours ago