CVE-2017-18786

7.8 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in multiple NETGEAR router models that allows attackers to execute arbitrary commands on affected devices. The vulnerability affects specific firmware versions of D6200, JNR1010v2, JR6150, JWNR2010v5, PR2000, R6050, WNR1000v4, WNR2020, and WNR2050 routers. Attackers can exploit this to gain unauthorized access and control over the router.

💻 Affected Systems

Products:
  • NETGEAR D6200
  • NETGEAR JNR1010v2
  • NETGEAR JR6150
  • NETGEAR JWNR2010v5
  • NETGEAR PR2000
  • NETGEAR R6050
  • NETGEAR WNR1000v4
  • NETGEAR WNR2020
  • NETGEAR WNR2050
Versions: D6200 before 1.1.00.24, JNR1010v2 before 1.1.0.44, JR6150 before 1.0.1.12, JWNR2010v5 before 1.1.0.44, PR2000 before 1.0.0.20, R6050 before 1.0.1.12, WNR1000v4 before 1.1.0.44, WNR2020 before 1.1.0.44, WNR2050 before 1.1.0.44
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific firmware versions only. Devices running newer firmware versions are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router allowing attacker to intercept all network traffic, install persistent backdoors, pivot to internal network devices, and use router as botnet node.

🟠

Likely Case

Router compromise leading to DNS hijacking, credential theft from network traffic, and installation of malware on connected devices.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, potentially only affecting router management interface.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - If router management interface is exposed internally, attackers could exploit from compromised internal hosts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Command injection vulnerabilities are typically easy to exploit. Public advisories and PoCs exist for similar NETGEAR vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: D6200: 1.1.00.24+, JNR1010v2: 1.1.0.44+, JR6150: 1.0.1.12+, JWNR2010v5: 1.1.0.44+, PR2000: 1.0.0.20+, R6050: 1.0.1.12+, WNR1000v4: 1.1.0.44+, WNR2020: 1.1.0.44+, WNR2050: 1.1.0.44+

Vendor Advisory: https://kb.netgear.com/000049529/Security-Advisory-for-Command-Injection-on-Some-Routers-PSV-2017-2949

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates. 4. If update available, download and install. 5. Router will reboot automatically.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router management interface

Restrict management access

all

Limit router management interface access to specific IP addresses

🧯 If You Can't Patch

  • Replace affected routers with supported models
  • Implement network segmentation to isolate router from critical systems

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under Advanced > Administration > Firmware Update

Check Version:

Check via router web interface or use nmap/router scanning tools

Verify Fix Applied:

Verify firmware version matches or exceeds patched versions listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in router logs
  • Multiple failed login attempts followed by successful access
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Traffic redirection patterns

SIEM Query:

source="router_logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")

🔗 References

📤 Share & Export