CVE-2020-35777

8.4 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on NETGEAR DGN2200v1 routers by injecting malicious commands into vulnerable parameters. It affects all users of NETGEAR DGN2200v1 routers running firmware versions before v1.0.0.58. Successful exploitation could give attackers full control of the affected router.

💻 Affected Systems

Products:
  • NETGEAR DGN2200v1
Versions: All firmware versions before v1.0.0.58
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the default configuration of the router. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to intercept all network traffic, install persistent backdoors, pivot to internal networks, and use the device for botnet activities.

🟠

Likely Case

Attackers gain shell access to the router, modify network settings, intercept credentials, and potentially compromise connected devices.

🟢

If Mitigated

Limited impact with proper network segmentation, but still exposes the router to unauthorized configuration changes.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing devices particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal devices are still vulnerable to attacks from compromised internal hosts or malicious insiders.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in the web interface and can be exploited via HTTP requests. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.0.0.58 or later

Vendor Advisory: https://kb.netgear.com/000062634/Security-Advisory-for-Command-Injection-Vulnerability-on-DGN2200v1-PSV-2020-0411

Restart Required: Yes

Instructions:

1. Log into router web interface. 2. Navigate to Advanced > Administration > Router Update. 3. Click 'Check' for updates. 4. If v1.0.0.58 or later is available, click 'Yes' to update. 5. Wait for router to reboot automatically.

🔧 Temporary Workarounds

Disable remote management

all

Prevents external attackers from accessing the vulnerable web interface

Log into router > Advanced > Remote Management > Uncheck 'Turn Remote Management On'

Restrict web interface access

all

Limit access to router web interface to trusted IP addresses only

Log into router > Advanced > Security > Access Control > Add trusted IP addresses

🧯 If You Can't Patch

  • Replace the router with a supported model that receives security updates
  • Place the router behind a firewall that blocks all inbound access to its management interface

🔍 How to Verify

Check if Vulnerable:

Log into router web interface and check firmware version. If version is below v1.0.0.58, the device is vulnerable.

Check Version:

curl -s http://routerlogin.net/currentsetting.htm | grep Firmware

Verify Fix Applied:

After updating, verify firmware version shows v1.0.0.58 or higher in the router web interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in router logs
  • Multiple failed login attempts followed by successful access
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • Traffic to known malicious IPs from router
  • DNS hijacking or unexpected proxy settings

SIEM Query:

source="router_logs" AND ("command injection" OR "shell" OR "exec" OR suspicious POST requests to router management interface)

🔗 References

📤 Share & Export