Categories: Breaking NewsHacking

A critical flaw in NetGear routers exposes them to cyber attacks

The security Expert Peter Adkins discovered a serious Information disclosure vulnerability that affects several Netgear wireless routers.

The researcher Peter Adkins discovered that several wireless routers produced by Netgear are affected by serious vulnerability that could allow an unauthenticated attacker to access sensitive data from the network device. By exploiting the vulnerability a hacker could also extract administrator passwords, the name and access keys for the wireless networks configured on the device, and details about the device including its model, firmware version and serial number, as explained in a post published on the Full Disclosure mailing list last week.

In a possible attack scenario, a threat actor could exploit the vulnerability after infecting a computer on the same LAN segment with a malware. Another possibility it to run a cross-site request forgery (CSRF) attack to trick users into visiting a site that forces their browsers to forward a malicious request to a vulnerable Netgear router on the local networks.

Wireless routers are a privileged target for hackers, threat actors compromise them to conduct several illegal activities, including traffic manipulation or run DDoS attack.

The security advisory published by the researcher Peter Adkins also includes a proof-of-concept, the experts confirmed to have tried to contact Netgear, but the technical support department of the company rejected its report.

The flaw in the Netgear devices can be exploited both over local area networks and over the Internet if the devices have the remote administration enabled.

Adkins explained that the vulnerability affects a service designed to interact with Netgear Genie, an application that allows users to monitor and control their routers directly from a mobile device (i.e. smartphones or a tablet).

The researcher discovered that sending HTTP requests to the SOAP service with a blank form and a “SOAPAction” header is possible to extract sensitive data from a vulnerable Netgear device.

“At first glance, this service appears to be filtered and authenticated; HTTP requests with a `SOAPAction` header set but without a session identifier will yield a HTTP 401 error. However, a HTTP request with a blank form and a `SOAPAction` header is sufficient to execute certain requests and query information from the device. As this SOAP service is implemented by the built-in HTTP / CGI daemon, unauthenticated queries will also be answered over the internet if remote management has been enabled on the device. As a result, affected devices can be interrogated and hijacked with as little as a well placed HTTP query.” wrote Adkins.

The security alert confirms that the following Netgear devices are affected

  • NetGear WNDR3700v4 – V1.0.0.4SH
  • NetGear WNDR3700v4 – V1.0.1.52
  • NetGear WNR2200 – V1.0.1.88
  • NetGear WNR2500 – V1.0.0.24

Additional platforms believed to be affected are:

  • NetGear WNDR3800
  • NetGear WNDRMAC
  • NetGear WPN824N
  • NetGear WNDR4700

Adkins recommends the following action to mitigate the risk:

  • Ensure remote / WAN management is disabled on the affected devices.
  • Only allow trusted devices access to the local network.

Pierluigi Paganini

(Security Affairs –  Netgear router, hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Japan passed a law allowing preemptive offensive cyber actions<gwmw style="display:none;"></gwmw>

Japan passed a law allowing preemptive offensive cyber actions, shifting from its pacifist stance to…

1 hour ago

Pwn2Own Berlin 2025: total prize money reached $1,078,750

Pwn2Own Berlin 2025 wrapped up with $383,750 awarded on the final day, pushing the total…

7 hours ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 45

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

1 day ago

Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles…

1 day ago

Experts found rogue devices, including hidden cellular radios, in Chinese-made power inverters used worldwide

Chinese "kill switches" found in Chinese-made power inverters in US solar farm equipment that could…

1 day ago