CVE-2020-28373

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers on the local network to execute arbitrary code on affected NETGEAR routers via a stack-based buffer overflow in the UPnP daemon. It affects multiple NETGEAR router models with specific firmware versions. Attackers can gain full control of the device without authentication.

💻 Affected Systems

Products:
  • NETGEAR R6400v2
  • NETGEAR R6400
  • NETGEAR R7000P
  • NETGEAR XR300
  • NETGEAR R8000
  • NETGEAR R8300
  • NETGEAR R8500
  • NETGEAR R7300DST
  • NETGEAR R7850
  • NETGEAR R7900
  • NETGEAR RAX20
  • NETGEAR RAX80
  • NETGEAR R6250
Versions: Specific firmware versions listed in CVE description
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: UPnP is typically enabled by default on these routers. Exploitation requires LAN access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router with persistent backdoor installation, credential theft, network traffic interception, and lateral movement to other devices.

🟠

Likely Case

Router takeover leading to DNS hijacking, credential harvesting, and network reconnaissance.

🟢

If Mitigated

Limited impact if UPnP is disabled and network segmentation isolates routers from untrusted devices.

🌐 Internet-Facing: LOW (requires LAN access, not directly exploitable from internet)
🏢 Internal Only: HIGH (exploitable from any device on local network without authentication)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists on GitHub. Exploitation is straightforward for attackers with LAN access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NETGEAR support for each model - newer firmware versions than those listed

Vendor Advisory: https://kb.netgear.com/

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates. 4. If update available, download and install. 5. Router will reboot automatically.

🔧 Temporary Workarounds

Disable UPnP

all

Disable Universal Plug and Play service to prevent exploitation

Log into router web interface > Advanced > Advanced Setup > UPnP > Disable

Network Segmentation

all

Isolate router management interface from general LAN

Create separate VLAN for router management
Restrict access to router IP to trusted devices only

🧯 If You Can't Patch

  • Disable UPnP immediately via router web interface
  • Implement strict network segmentation to limit LAN access to router

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface and compare with affected versions in CVE description

Check Version:

Log into router web interface > Advanced > Administration > Router Status

Verify Fix Applied:

Verify firmware version is newer than affected versions listed, then confirm UPnP is disabled

📡 Detection & Monitoring

Log Indicators:

  • Unusual UPnP requests
  • Buffer overflow patterns in router logs
  • Unexpected process crashes

Network Indicators:

  • Suspicious UPnP traffic to router on port 1900/udp
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" AND ("upnpd" OR "buffer overflow" OR "segmentation fault")

🔗 References

📤 Share & Export