CVE-2019-20730

9.8 CRITICAL

📋 TL;DR

This CVE describes a SQL injection vulnerability affecting multiple NETGEAR router, gateway, and extender models. Attackers can execute arbitrary SQL commands through unvalidated input, potentially compromising device security. Users with affected devices running vulnerable firmware versions are at risk.

💻 Affected Systems

Products:
  • NETGEAR D3600
  • D6000
  • D6200
  • D6220
  • D6400
  • D7000
  • D7000v2
  • D7800
  • D8500
  • DC112A
  • EX8000
  • JR6150
  • R6050
  • R6220
  • R6250
  • R6300v2
  • R6400
  • R6400v2
  • R6700
  • R6700v2
  • R6800
  • R6900v2
  • R6900
  • R7000
  • R6900P
  • R7000P
  • R7100LG
  • R7300DST
  • R7500
  • R7500v2
  • R7800
  • R7900
  • R8000
  • R7900P
  • R8000P
  • R8300
  • R8500
  • R8900
  • R9000
  • WNDR3700v4
  • WNDR3700v5
  • WNDR4300v1
  • WNDR4300v2
  • WNDR4500v3
Versions: Versions before specified security patches (e.g., D3600 before 1.0.0.68, D6000 before 1.0.0.68, etc.)
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected devices in default configuration are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to extract credentials, modify configurations, execute arbitrary code, and pivot to internal networks.

🟠

Likely Case

Unauthorized access to device administration, credential theft, and configuration manipulation leading to network compromise.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted WAN access and strong authentication controls.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they gain network access, but requires local network presence.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are well-understood and often have public exploits. The CVSS 9.8 score indicates trivial exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Varies by model (e.g., D3600 1.0.0.68+, D6000 1.0.0.68+, etc.)

Vendor Advisory: https://kb.netgear.com/000061197/Security-Advisory-for-SQL-Injection-on-Some-Routers-Gateways-and-Extenders-PSV-2017-3056

Restart Required: Yes

Instructions:

1. Identify your NETGEAR model number. 2. Visit NETGEAR support site. 3. Download latest firmware for your model. 4. Log into router admin interface. 5. Navigate to Advanced > Administration > Firmware Update. 6. Upload and install the firmware file. 7. Wait for router to reboot.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevents external attackers from accessing the vulnerable interface

Network Segmentation

all

Place router on isolated network segment to limit attack surface

🧯 If You Can't Patch

  • Replace affected device with supported model
  • Implement network firewall rules to restrict access to router management interface

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under Advanced > Administration > Firmware Update

Check Version:

No CLI command - check via web interface at http://routerlogin.net or http://192.168.1.1

Verify Fix Applied:

Confirm firmware version matches or exceeds the patched version for your specific model

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in router logs
  • Multiple failed login attempts followed by successful access
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • SQL query patterns in HTTP requests to router management interface

SIEM Query:

source="router_logs" AND ("sql" OR "injection" OR "syntax error")

🔗 References

📤 Share & Export