"Multiple Vulnerabilities Impact Netgear Nighthawk R6700 Routers"

According to Tenable researchers, Netgear Nighthawk R6700v3 routers running the latest firmware are affected by multiple vulnerabilities. The most important of these security defects results in an authenticated attacker being able to inject commands that would be executed when the device checks for updates. Tracked as CVE-2021-20173, the issue exists because unsanitized input is being sent to system() calls in the upnpd binary. The adversary can send requests from the SOAP interface to force update checks and trigger the execution of commands. Furthermore, Tenable’s researchers discovered that communication to and from the device’s web and SOAP interfaces is not encrypted, meaning that sensitive information such as usernames and passwords is transmitted in cleartext. The researchers also noticed that the device stores usernames and passwords in plaintext, including the admin password. Another identified vulnerability (CVE-2021-23147) could allow an attacker with physical access to the device to connect to the UART port via a serial connection and run commands as root without authentication. Additionally, Tenable’s researchers discovered that the device uses instances of known vulnerable jQuery libraries, as well as a minidlna.exe iteration that contains publicly known vulnerabilities. Netgear Nighthawk R6700v3 routers running firmware version 1.0.4.120 are known to be vulnerable. The researchers reported the bugs to Netgear at the end of September, but the vendor hasn’t released patches until now.  

 

SecurityWeek reports: "Multiple Vulnerabilities Impact Netgear Nighthawk R6700 Routers"

Submitted by Anonymous on