CVE-2020-35787

8.0 HIGH

📋 TL;DR

This vulnerability allows an authenticated attacker to trigger a buffer overflow on affected NETGEAR routers and range extenders. Successful exploitation could lead to remote code execution or device compromise. Only users with administrative credentials can exploit this vulnerability.

💻 Affected Systems

Products:
  • NETGEAR D3600
  • D6000
  • D6200
  • D7000
  • EX6200v2
  • EX7000
  • EX8000
  • JR6150
  • PR2000
  • R6020
  • R6050
  • R6080
  • R6120
  • R6220
  • R6260
  • R6300v2
  • R6700
  • R6700v2
  • R6800
  • R6900
  • R6900P
  • R6900v2
  • R7000
  • R7000P
  • R7800
  • R8900
  • R9000
  • XR500
Versions: Versions before those specified in CVE description (e.g., D3600 before 1.0.0.76)
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable if running affected firmware versions. Requires authenticated access to administrative interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with administrative privileges leading to complete device takeover, network compromise, and potential lateral movement to connected devices.

🟠

Likely Case

Device crash/reboot causing denial of service, or limited code execution within router context.

🟢

If Mitigated

No impact if proper authentication controls prevent unauthorized access to administrative interfaces.

🌐 Internet-Facing: MEDIUM - Requires authenticated access but many routers have web interfaces exposed to internet.
🏢 Internal Only: MEDIUM - Requires authenticated attacker on local network with administrative credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and buffer overflow exploitation knowledge. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Minimum versions specified in CVE description (e.g., D3600 1.0.0.76 or later)

Vendor Advisory: https://kb.netgear.com/000062710/Security-Advisory-for-Post-Authentication-Buffer-Overflow-on-Some-Routers-and-Range-Extenders-PSV-2018-0379

Restart Required: Yes

Instructions:

1. Log into router web interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates or manually download from NETGEAR support site. 4. Upload and install latest firmware. 5. Router will reboot automatically.

🔧 Temporary Workarounds

Disable remote administration

all

Prevent external access to router administrative interface

Use strong administrative credentials

all

Implement complex passwords to reduce risk of credential compromise

🧯 If You Can't Patch

  • Segment network to isolate vulnerable devices
  • Implement strict access controls to router administrative interface

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under Advanced > Administration > Firmware Update

Check Version:

No CLI command - check via web interface or router label

Verify Fix Applied:

Verify firmware version matches or exceeds minimum patched version from advisory

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by buffer overflow patterns
  • Unexpected router reboots or crashes

Network Indicators:

  • Unusual traffic patterns from router administrative interface
  • Multiple POST requests to router admin pages with large payloads

SIEM Query:

source="router_logs" AND (event="authentication_failure" OR event="buffer_overflow" OR event="system_reboot")

🔗 References

📤 Share & Export