HomeVulnerabilityNetgear WNR614 flaws enable gadget takeover, no repair out there

Netgear WNR614 flaws enable gadget takeover, no repair out there

Researchers discovered half a dozen vulnerabilities of various severity impacting Netgear WNR614 N300, a budget-friendly router that proved widespread amongst house customers and small companies.

The gadget reached end-of-life (EoL) and is not supported by Netgear however it’s nonetheless current in lots of environments as a consequence of its reliability, ease of use, and efficiency.

Researchers at RedFox Safety found within the router six vulnerabilities that vary from authentication bypass and weak password coverage to storing passwords in plain textual content and Wi-Fi Protected Setup (WPS) PIN publicity:

CVE-2024-36787: permits an attacker to bypass authentication and entry the executive interface through unspecified vectors. The flaw allows unauthorized entry to the router’s settings, posing a extreme risk to community security and delicate person knowledge.

Broken access control
Damaged entry management
Supply: RedFox

CVE-2024-36788: the router has improper setting of the HTTPOnly flag for cookies. An attacker may leverage the vulnerability to intercept and entry delicate communications between the router and the gadgets connecting to it.

See also  embrace Safe by Design rules whereas adopting AI

CVE-2024-36789: permits attackers to create passwords that don’t adjust to correct security requirements and even settle for a single character as a password for the administrator account. This may result in unauthorized entry, community manipulation, and potential knowledge publicity.

CVE-2024-36790: the router shops credentials in plain textual content, which makes it straightforward for an attacker to acquire unauthorized entry, manipulate the router, and expose delicate knowledge.

Plaintext data exposure
Plaintext knowledge publicity
Supply: RedFox

CVE-2024-36792: the implementation of the WPS Wi-Fi characteristic permits attackers to achieve entry to the router’s PIN. This exposes the router to potential unauthorized entry and manipulation.

WPS PIN exposure
WPS PIN publicity
Supply: RedFox

CVE-2024-36795: insecure permissions that enable attackers to entry URLs and directories embedded inside the router’s firmware. This heightens the chance of unauthorized community entry and management.


For the reason that router has reached EoL, Netgear is just not anticipated to launch security updates for the vulnerabilities. If changing the gadget is just not an choice in the meanwhile, customers are strongly suggested to use mitigatations that might assist forestall assaults:

  • Flip off distant administration options to cut back the chance of unauthorized entry.
  • Use advanced, lengthy passwords and alter them repeatedly.
  • Separate the router from vital methods inside the community to restrict the impression of any potential breach.
  • Make sure the router makes use of HTTPS and use browser settings that implement HTTPS to safe all communications and defend towards interception.
  • Flip off WPS to stop attackers from exploiting this characteristic and gaining unauthorized entry.
  • Swap to WPA3 for enhanced security over older protocols.
  • Prohibit entry to the router’s administrative interface.
See also  The state of ransomware: Sooner, smarter, and meaner

Nonetheless, customers that also depend on Netgear WNR614 ought to think about changing it with a mannequin that’s actively supported by its producer and gives higher security.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular