Quantcast
Vulnerability in Netgear and other home Routers - Beyond.ca - Car Forums
Results 1 to 11 of 11

Thread: Vulnerability in Netgear and other home Routers

  1. #1
    Join Date
    Sep 2008
    Location
    Edmonton, AB
    Posts
    259
    Rep Power
    16

    Default Vulnerability in Netgear and other home Routers

    Vulnerability Prompts Warning: Stop Using Netgear WiFi Routers

    "By convincing a user to visit a specially crafted web site, a remote attacker may execute arbitrary commands with root privileges on affected routers," warns a new vulnerability notice from Carnegie Mellon University's CERT. ...
    Security Advisory for VU 582384, PSV-2016-0245
    NETGEAR is aware of the security issue #582384 that allows unauthenticated web pages to pass form input directly to the command-line interface. A remote attacker can potentially inject arbitrary commands which are then executed by the system.

    NETGEAR has tested the following products and confirmed that they are vulnerable: All products followed by a single asterisk (*) have beta firmware fixes available. All products followed by three asterisks (***) have production firmware fixes available.

    R6250* R6400*** R6700* R6900* R7000*** R7100LG* R7300DST* R7900* R8000*** D6220* D6400*
    The D7000 was previously included in a list of models that were affected by this security vulnerability. However, NETGEAR has tested and confirmed that the D7000 is not affected by this command injection vulnerability.
    R7000 Nighthawk is pretty popular here... prod fix firmware came out yesterday.
    Originally posted by Xtrema
    ZenOps is like everyone's crazy uncle.
    Originally posted by DayGlow
    How do you respond to stupid?
    Originally posted by rage2
    Jesus fucking christ Rob Anders, learn to read your own links.
    Originally posted by Seth1968
    Zenops: Ok, but remember my dick is made of nickle.

  2. #2
    Join Date
    Jun 2002
    Location
    Calgary, AB
    Posts
    1,991
    Rep Power
    30

    Default

    Thanks for the share.

  3. #3
    Join Date
    Jan 1970
    Location
    YYC
    My Ride
    1 x E Class Benz
    Posts
    23,609
    Rep Power
    101

    Default

    http://arstechnica.com/security/2016...isement-blitz/

    Another router attack. This one affects not just Netgear, tons of brands are affected. If you have a default or weak password on your router, it's also vulnerable. The shitty thing about this one is that it's served through legitimate ad networks, so no user intervention is necessary to get exploited.

    Upgrade your firmwares, set a strong password, and cross your fingers.

    Once your DNS is hijacked, the attackers can easily spoof legitimate services on the other end to phish your credentials. Serious business.
    Originally posted by SEANBANERJEE
    I have gone above and beyond what I should rightfully have to do to protect my good name

  4. #4
    Join Date
    Sep 2004
    Location
    Calgary
    Posts
    10,406
    Rep Power
    35

    Default

    Good reminder thread - it's amazing how many people don't even know their routers have firmware, let alone to go looking for updates. I check every couple days or so and thankfully am up to date.

  5. #5
    Join Date
    Jan 2004
    Location
    Calgary, Alberta
    My Ride
    Bicycle
    Posts
    9,279
    Rep Power
    49

    Default

    Originally posted by rage2
    http://arstechnica.com/security/2016...isement-blitz/

    Another router attack. This one affects not just Netgear, tons of brands are affected. If you have a default or weak password on your router, it's also vulnerable. The shitty thing about this one is that it's served through legitimate ad networks, so no user intervention is necessary to get exploited.

    Upgrade your firmwares, set a strong password, and cross your fingers.

    Once your DNS is hijacked, the attackers can easily spoof legitimate services on the other end to phish your credentials. Serious business.
    This is one of the reason why I run my own DNS with it's forwarder to 8.8.8.8.

    I never trust the one on router or Shaw.

  6. #6
    Join Date
    Jan 1970
    Location
    YYC
    My Ride
    1 x E Class Benz
    Posts
    23,609
    Rep Power
    101

    Default

    Originally posted by Xtrema
    This is one of the reason why I run my own DNS with it's forwarder to 8.8.8.8.

    I never trust the one on router or Shaw.
    That won't make a difference. You would still be vulnerable. It's forcing your clients to use their DNS server, multiple ways of doing that. Easy way is to just push their DNS server IPs through DHCP. More difficult and impossible to bypass way is to filter all DNS requests and proxy it to their servers. So even if you point to 8.8.8.8 or your own server which makes requests through 8.8.8.8 or uses root hints to figure things out, it'll still be going to their attack DNS server without your knowledge.

    What I'm interested in knowing is how the hell are they stuffing code in image metadata and having the browser execute it. Surely that should be a vulnerability that needs to be closed.
    Originally posted by SEANBANERJEE
    I have gone above and beyond what I should rightfully have to do to protect my good name

  7. #7
    Join Date
    Apr 2004
    Location
    Calgary
    Posts
    2,093
    Rep Power
    44

    Default

    Originally posted by rage2

    That won't make a difference. You would still be vulnerable. It's forcing your clients to use their DNS server, multiple ways of doing that. Easy way is to just push their DNS server IPs through DHCP. More difficult and impossible to bypass way is to filter all DNS requests and proxy it to their servers. So even if you point to 8.8.8.8 or your own server which makes requests through 8.8.8.8 or uses root hints to figure things out, it'll still be going to their attack DNS server without your knowledge.

    What I'm interested in knowing is how the hell are they stuffing code in image metadata and having the browser execute it. Surely that should be a vulnerability that needs to be closed.
    Couldnt you enter your own DNS server into the OS settings instead of getting it from router/isp dhcp? I think you can set windows up to get IP from dhcp while setting your own dns servers

  8. #8
    Join Date
    Jan 2006
    Location
    Calgary
    My Ride
    Axis powers
    Posts
    2,486
    Rep Power
    24

    Default

    Originally posted by sabad66

    Couldnt you enter your own DNS server into the OS settings instead of getting it from router/isp dhcp? I think you can set windows up to get IP from dhcp while setting your own dns servers
    Dns is a protocol not just a number you program into a device, by forcing all dns traffic to a certain server it doesn't matter how your settings are configured

  9. #9
    Join Date
    Jun 2003
    Location
    Alaska
    My Ride
    Model S
    Posts
    2,034
    Rep Power
    26

    Default

    Originally posted by rage2

    What I'm interested in knowing is how the hell are they stuffing code in image metadata and having the browser execute it. Surely that should be a vulnerability that needs to be closed.
    They aren't, bad reporting.

    The problem is that most Ad networks have this fucked up idea that advertisers should be allowed to upload HTML/JS ads. So attackers buy malicious ads, and the JS that they supply is now running in your browser when you visit a legitimate site with ads on it.

    In this case, to make sure that their malicious JS didn't get detected by the ad network's laughably weak filters that try to detect shady looking scripts, they obfuscate it and put the bad javascript into PNG metadata, and shipped a stub JS snippet that parses that out of a PNG also delivered on the page, then just loads and executes it as a new script on the fly. So if you just look/scan at the JS, you don't see the malicious part.

    The payload that it pulls out just uses your browser to start sending requests to known or probable router IPs like 192.168.1.1 and use default login/passwords, command injection, or CSRF to change your settings. They made a list of 200 or so routers and attacks for them and it just tries to find one that works.

    The worse ones use a JS browser exploit or flash exploit directly, followed by a kernel exploit to elevate privileges, then ransomware your PC.

    So as far as the conventional wisdom goes regarding not visiting shady websites and your browser is safe, that's out the window. It doesn't matter what kind of sites you visit anymore, as long as you hit a site with ads that are delivered as javascript, you're at risk.

  10. #10
    Join Date
    May 2008
    Location
    Wildflower Ranch
    My Ride
    Neo-Liberal Anarchist Mobile
    Posts
    2,245
    Rep Power
    38

    Default

    Thanks for the post. I was not aware of this and own one of the affected routers.
    Quote Originally Posted by 89coupe View Post
    This quote is hidden because you are ignoring this member. Show Quote
    Beyond, bunch of creme puffs on this board.
    Everything I say is satire.

  11. #11
    Join Date
    Jan 1970
    Location
    YYC
    My Ride
    1 x E Class Benz
    Posts
    23,609
    Rep Power
    101

    Default

    Thanks googe. Perfect explanation. Wish I had more time these days to research the actual details.

    So really the only solution is to sandbox the browser completely. I guess it makes sense why MS is moving Edge into its own VM to isolate things even more, at the expense of usability.
    Originally posted by SEANBANERJEE
    I have gone above and beyond what I should rightfully have to do to protect my good name

Similar Threads

  1. Chinese hacked Tesla via browser vulnerability

    By Xtrema in forum Automotive News
    Replies: 13
    Latest Threads: 09-29-2016, 11:04 AM
  2. Home Network Issue - Asus Routers fighting each other?

    By killramos in forum Computer Help Desk
    Replies: 19
    Latest Threads: 03-04-2016, 08:06 PM
  3. OpenSSL/Heartbleed Vulnerability

    By frizzlefry in forum Society / Law / Current Events / Politics
    Replies: 85
    Latest Threads: 04-16-2014, 01:07 PM
  4. NFC for Android - Vulnerability +++?

    By jwslam in forum Computers, Consoles, and other Electronics
    Replies: 1
    Latest Threads: 07-26-2012, 10:43 PM
  5. FS: Routers/ADSL Modem/Wireless Routers/SCSI Scanner etc.

    By JDMMAN in forum Computer Hardware & Peripherals
    Replies: 0
    Latest Threads: 06-06-2009, 07:47 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •