Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Netgear Router Vulnerability Update Now!

Netgear Router Vulnerability Update: Tenable’s Zero Day Research Team reviewed the target list for the Zero Day Initiative’s (ZDI) Pwn2Own Toronto event, which then started looking into NETGEAR’s Nighthawk router. Pwn2Own is a hacking contest where competitors employ zero-day vulnerabilities to target commonly used software and gadgets.

ZDI’s larger goal of gathering and disclosing vulnerabilities to vendors, creating signatures for intrusion detection, and helping defenders minimize their exposure is complemented by Pwn2Own.

A unique challenge in the competition is a small office/home office (SOHO) “smashup” designed to mimic a real-world attack in which a hacker would exploit flaws in several devices to compromise a home network.

There is a far more significant likelihood that security researchers have previously dissected the competition’s targets and discovered interesting vulnerabilities because they are extensively used.

Vendors may deliver hurried updates that can stop assault chains while teams and individuals spend weeks gathering their zero days.

Unluckily for the Tenable team, NETGEAR closed one of the most significant holes in our attack chain the day before the Pwn2Own registration deadline. Similarly, we can now see individuals looking for Netgear Router Vulnerability Update.

Netgear Bug Discovered And Fixed

However, as explained by Bleeping Computer, the effects of buffer overflow attacks “may range from crashes following denial of service to arbitrary code execution, provided code execution is achieved during the assault.” Netgear did not provide any other information regarding the issue.

The WiFi routers affected by the security flaw are all listed in detail by Netgear, along with the firmware updates that fix the deficiency in each router:

  • RAX40 fixed in firmware version 1.0.2.60
  • RAX35 fixed in firmware version 1.0.2.60
  • R6400v2 fixed in firmware version 1.0.4.122
  • R6700v3 fixed in firmware version 1.0.4.122
  • R6900P fixed in firmware version 1.3.3.152
  • R7000P fixed in firmware version 1.3.3.152
  • R7000 fixed in firmware version 1.0.11.136
  • R7960P fixed in firmware version 1.4.4.94
  • R8000P fixed in firmware version 1.4.4.94

Also Read:

Netgear Router Vulnerability Update Now!

Image Source: tomsguide

How To Update A Netgear Router’s Firmware?

The business has provided a guide for updating the firmware on your router. If you have one of the routers mentioned above, take the following actions right away:

  • Check out NETGEAR Support.
  • When the drop-down menu displays, select your model after starting to type your model number in the search box.
  • Check to ensure whether you entered your model number correctly or choose a product category to look for your product model if you don’t see a drop-down selection.
  • Press Downloads.
  • Choose the download whose name starts with “Firmware Version” under Current Versions.
  • To download, click.
  • To install the updated firmware, adhere to the directions in your product’s user manual, firmware release notes, or product support page.

If you don’t follow all the instructions, the pre-authentication buffer overflow vulnerability still exists, Netgear advises at the bottom of the security advisory on its support page. “NETGEAR is not liable for any effects that could have been prevented by heeding the advice in this notification,” the statement reads.

Similarly, we can now see individuals looking for Netgear Router Vulnerability Update Now. If you believe this is interesting, please discuss it with the other people you know. Visit journalistjunction.com for the most recent news and updates regarding famous people.

Hey Everyone! This is Maria. You'll be really glad to know that my passion of reading Novels proved to be a boon for me ever since I've started writing Articles. Make sure to read out my articles and drop down your comments on them!