Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.




1043 posts

Uber Geek
+1 received by user: 215


Topic # 206214 14-Dec-2016 18:18
Send private message

Source: http://kb.netgear.com/000036386/CVE-2016-582384?cid=wmt_netgear_organic

 

Related news: http://www.computerworld.com/article/3148680/networking/easily-exploited-netgear-router-flaw-discovered.html

 

 

 

NETGEAR:

 

NETGEAR is aware of the security issue #582384 that allows unauthenticated web pages to pass form input directly to the command-line interface. A remote attacker can potentially inject arbitrary commands which are then executed by the system.

 

NETGEAR has tested the following products and confirmed that they are vulnerable:

 

All products followed by an asterisk (*) have beta firmware fixes available—see below.

 

  • R6250*
  • R6400*
  • R6700*
  • R6900
  • R7000*
  • R7100LG
  • R7300
  • R7900
  • R8000*
  • D6220
  • D7000 

NETGEAR is working on a production firmware version that fixes this command injection vulnerability and will release it as quickly as possible.

 

While we are working on the production version of the firmware, we are providing a beta version of this firmware release. This beta firmware has not been fully tested and might not work for all users. NETGEAR is offering this beta firmware release as a temporary solution, but NETGEAR strongly recommends that all users download the production version of the firmware release as soon as it is available.

 

Beta firmware is currently available for the models listed below, and beta firmware versions for the remaining models are being worked on and will be released as soon as possible, some as early as Tuesday, December 13th.

 

To download the beta firmware, which fixes the command injection vulnerability, visit the firmware release page for your model and follow the instructions:

 

NETGEAR is continuing to review our entire portfolio for other routers that might be affected by this vulnerability. If any other routers are affected by the same security vulnerability, we plan to release firmware to fix those as well.

 

NETGEAR will continue to update this knowledge base article when we have more information.

 

We appreciate and value having security concerns brought to our attention. NETGEAR constantly monitors for both known and unknown threats. Being pro-active rather than re-active to emerging security issues is fundamental for product support at NETGEAR.

It is NETGEAR's mission to be the innovative leader in connecting the world to the internet. To achieve this mission, we strive to earn and maintain the trust of those that use NETGEAR products for their connectivity.

 

If you have any security concerns, you can reach us at security@netgear.com.


Create new topic

Stu

Hammered
5144 posts

Uber Geek
+1 received by user: 1116

Moderator
Trusted
Lifetime subscriber

  Reply # 1687833 14-Dec-2016 18:33
Send private message

http://www.geekzone.co.nz/forums.asp?forumid=66&topicid=206153 

 

Please continue in the existing thread. Cheers!





Keep calm, and carry on posting.

 

 

 

Click to see full size Click to see full size


Create new topic



Twitter »

Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.


Support Geekzone »

Our community of supporters help make Geekzone possible. Click the button below to join them.

Support Geezone on PressPatron



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.