• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
high severity rce flaw disclosed in several netgear router models

High-Severity RCE Flaw Disclosed in Several Netgear Router Models

You are here: Home / General Cyber Security News / High-Severity RCE Flaw Disclosed in Several Netgear Router Models
September 22, 2021

Networking products company Netgear has released patches to remediate a superior-severity distant code execution vulnerability influencing a number of routers that could be exploited by distant attackers to just take control of an influenced process.

Traced as CVE-2021-40847 (CVSS rating: 8.1), the security weak point impacts the pursuing versions –

  • R6400v2 (fixed in firmware model 1..4.120)
  • R6700 (set in firmware version 1..2.26)
  • R6700v3 (set in firmware edition 1..4.120)
  • R6900 (preset in firmware variation 1..2.26)
  • R6900P (set in firmware version 3.3.142_HOTFIX)
  • R7000 (fastened in firmware variation 1..11.128)
  • R7000P (preset in firmware variation 1.3.3.142_HOTFIX)
  • R7850 (mounted in firmware variation 1..5.76)
  • R7900 (fixed in firmware model 1..4.46)
  • R8000 (fixed in firmware variation 1..4.76)
  • RS400 (mounted in firmware model 1.5.1.80)

According to GRIMM security researcher Adam Nichols, the vulnerability resides in Circle, a third-party element provided in the firmware that offers parental handle capabilities, with the Circle update daemon enabled to operate by default even if the router has not been configured to limit everyday internet time for web-sites and apps. This outcomes in a situation that could permit terrible actors with network entry to obtain distant code execution (RCE) as root through a Person-in-the-Middle (MitM) attack.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


This is designed doable owing to the manner in which the update daemon (named “circled”) connects to Circle and Netgear to fetch updates to the filtering databases — which are both of those unsigned and downloaded using HTTP — thus generating it doable for an interloper to stage a MitM attack and reply to the update ask for with a specially-crafted compressed databases file, extracting which gives the attacker the skill to overwrite executable binaries with destructive code.

Prevent Ransomware Attacks

“Due to the fact this code is run as root on the impacted routers, exploiting it to get hold of RCE is just as harmful as a RCE vulnerability located in the main Netgear firmware,” Nichols claimed. “This unique vulnerability when again demonstrates the relevance of attack surface area reduction.”

The disclosure will come months right after Google security engineer Gynvael Coldwind exposed information of three extreme security vulnerabilities dubbed Demon’s Cries, Draconian Anxiety, and Seventh Inferno, impacting above a dozen of its smart switches, making it possible for threat actors to bypass authentication and attain entire manage of vulnerable equipment.

Identified this posting exciting? Comply with THN on Facebook, Twitter  and LinkedIn to browse much more unique content we put up.


Some pieces of this article are sourced from:
thehackernews.com

Previous Post: «vmware warns of critical file upload vulnerability affecting vcenter server VMware Warns of Critical File Upload Vulnerability Affecting vCenter Server
Next Post: The Gap in Your Zero Trust Implementation the gap in your zero trust implementation»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.