This lack of proper security protections opens the door for an attacker to craft malicious HTTP requests that can be used to take over the router. The GRIMM security researcher says the server doesn't properly validate user input, doesn't use "stack cookies" (aka canaries) to protect its memory, and the server's binary is not compiled as a Position-independent Executable (PIE), meaning ASLR (address space layout randomization) is never applied. The web server is used to power the router's built-in administration panel. In a technical breakdown of the vulnerability, Nichols says the bug resides in the web server component that's packed inside the vulnerable Netgear router firmware.
The vulnerability has been discovered by two security researchers independently, namely Adam Nichols from cyber-security GRIMM and a security researcher going by the nickname of d4rkn3ss, working for Vietnamese internet service provider VNPT.Īccording to Nichols, the vulnerability impacts 758 different firmware versions that have been used on 79 Netgear routers across the years, with some firmware versions being first deployed on devices released as far back as 2007. Our top picks for commercial properties will help secure the workplace for small and large businesses alike.Ī whopping 79 Netgear router models are vulnerable to a severe security flaw that can let hackers take over devices remotely.