Netgear Router Vulnerability Update: Tenable’s Zero Day Research Team reviewed the target list for the Zero Day Initiative’s (ZDI) Pwn2Own Toronto event, which then started looking into NETGEAR’s Nighthawk router. Pwn2Own is a hacking contest where competitors employ zero-day vulnerabilities to target commonly used software and gadgets.
ZDI’s larger goal of gathering and disclosing vulnerabilities to vendors, creating signatures for intrusion detection, and helping defenders minimize their exposure is complemented by Pwn2Own.
A unique challenge in the competition is a small office/home office (SOHO) “smashup” designed to mimic a real-world attack in which a hacker would exploit flaws in several devices to compromise a home network.
There is a far more significant likelihood that security researchers have previously dissected the competition’s targets and discovered interesting vulnerabilities because they are extensively used.
Vendors may deliver hurried updates that can stop assault chains while teams and individuals spend weeks gathering their zero days.
Unluckily for the Tenable team, NETGEAR closed one of the most significant holes in our attack chain the day before the Pwn2Own registration deadline. Similarly, we can now see individuals looking for Netgear Router Vulnerability Update.
Netgear Bug Discovered And Fixed
However, as explained by Bleeping Computer, the effects of buffer overflow attacks “may range from crashes following denial of service to arbitrary code execution, provided code execution is achieved during the assault.” Netgear did not provide any other information regarding the issue.
The WiFi routers affected by the security flaw are all listed in detail by Netgear, along with the firmware updates that fix the deficiency in each router:
- RAX40 fixed in firmware version 220.127.116.11
- RAX35 fixed in firmware version 18.104.22.168
- R6400v2 fixed in firmware version 22.214.171.124
- R6700v3 fixed in firmware version 126.96.36.199
- R6900P fixed in firmware version 188.8.131.52
- R7000P fixed in firmware version 184.108.40.206
- R7000 fixed in firmware version 220.127.116.11
- R7960P fixed in firmware version 18.104.22.168
- R8000P fixed in firmware version 22.214.171.124
- AMD Responds To Radeon RX 7900 XTX Thermal Issues, Asks Users To Contact Support!
- Horizon Forbidden West Alpha Build Has Been Leaked Online!
Image Source: tomsguide
How To Update A Netgear Router’s Firmware?
The business has provided a guide for updating the firmware on your router. If you have one of the routers mentioned above, take the following actions right away:
- Check out NETGEAR Support.
- When the drop-down menu displays, select your model after starting to type your model number in the search box.
- Check to ensure whether you entered your model number correctly or choose a product category to look for your product model if you don’t see a drop-down selection.
- Press Downloads.
- Choose the download whose name starts with “Firmware Version” under Current Versions.
- To download, click.
- To install the updated firmware, adhere to the directions in your product’s user manual, firmware release notes, or product support page.
If you don’t follow all the instructions, the pre-authentication buffer overflow vulnerability still exists, Netgear advises at the bottom of the security advisory on its support page. “NETGEAR is not liable for any effects that could have been prevented by heeding the advice in this notification,” the statement reads.
Similarly, we can now see individuals looking for Netgear Router Vulnerability Update Now. If you believe this is interesting, please discuss it with the other people you know. Visit journalistjunction.com for the most recent news and updates regarding famous people.