CVE-2017-18779

7.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in multiple NETGEAR router models allows attackers to execute arbitrary code or cause denial of service. This affects specific firmware versions of D6200, D7000, JNR1010v2, JR6150, JWNR2010v5, PR2000, R6020, R6050, R6080, R6120, R6220, R6700v2, R6800, R6900v2, WNDR3700v5, WNR1000v4, WNR2020, and WNR2050 routers. Users with affected devices running vulnerable firmware are at risk.

💻 Affected Systems

Products:
  • NETGEAR D6200
  • NETGEAR D7000
  • NETGEAR JNR1010v2
  • NETGEAR JR6150
  • NETGEAR JWNR2010v5
  • NETGEAR PR2000
  • NETGEAR R6020
  • NETGEAR R6050
  • NETGEAR R6080
  • NETGEAR R6120
  • NETGEAR R6220
  • NETGEAR R6700v2
  • NETGEAR R6800
  • NETGEAR R6900v2
  • NETGEAR WNDR3700v5
  • NETGEAR WNR1000v4
  • NETGEAR WNR2020
  • NETGEAR WNR2050
Versions: Versions before: D6200 1.1.00.24, D7000 1.0.1.52, JNR1010v2 1.1.0.44, JR6150 1.0.1.12, JWNR2010v5 1.1.0.44, PR2000 1.0.0.20, R6020 1.0.0.26, R6050 1.0.1.12, R6080 1.0.0.26, R6120 1.0.0.36, R6220 1.1.0.60, R6700v2 1.2.0.12, R6800 1.2.0.12, R6900v2 1.2.0.12, WNDR3700v5 1.1.0.50, WNR1000v4 1.1.0.44, WNR2020 1.1.0.44, WNR2050 1.1.0.44
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected devices with vulnerable firmware versions are vulnerable in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete router compromise, credential theft, network traffic interception, and lateral movement to connected devices.

🟠

Likely Case

Router crash/reboot causing temporary denial of service and network disruption.

🟢

If Mitigated

Limited impact if patched or isolated from untrusted networks.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices that could be exploited remotely.
🏢 Internal Only: LOW - This primarily affects internet-facing router interfaces, though internal exploitation is possible if attacker gains network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Buffer overflow vulnerabilities in network devices often require specific conditions to exploit, but successful exploitation could lead to remote code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See affected_systems.versions for minimum fixed versions per model

Vendor Advisory: https://kb.netgear.com/000049541/Security-Advisory-for-Buffer-Overflow-on-Some-Routers-PSV-2017-2956

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates or manually download latest firmware from NETGEAR support site. 4. Upload and install firmware update. 5. Router will reboot automatically.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate router management interface from untrusted networks

Disable Remote Management

all

Turn off remote administration features if not required

🧯 If You Can't Patch

  • Replace affected router with supported model
  • Implement strict network access controls to limit exposure

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under Advanced > Administration > Firmware Update

Check Version:

No CLI command - check via web interface at http://routerlogin.net or router IP

Verify Fix Applied:

Confirm firmware version matches or exceeds minimum fixed version for your model

📡 Detection & Monitoring

Log Indicators:

  • Router crash/reboot events
  • Unusual authentication attempts
  • Buffer overflow error messages in system logs

Network Indicators:

  • Unusual traffic patterns to router management interface
  • Multiple failed connection attempts

SIEM Query:

source="router_logs" AND (event_type="crash" OR event_type="reboot" OR message="*buffer*overflow*")

🔗 References

📤 Share & Export