CVE-2023-28337

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to upload malicious firmware to Netgear Nighthawk RAX30 routers by exploiting a hidden 'forceFWUpdate' parameter that bypasses validation checks. This affects all users of vulnerable RAX30 router firmware versions. Attackers could gain complete control of affected routers.

💻 Affected Systems

Products:
  • Netgear Nighthawk RAX30 WiFi 6 Router
Versions: Firmware versions prior to V1.0.10.94
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Requires access to router's web administration interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete router compromise allowing persistent backdoor installation, traffic interception, credential theft, and use as attack platform.

🟠

Likely Case

Router takeover enabling network surveillance, DNS hijacking, and credential harvesting from connected devices.

🟢

If Mitigated

Limited impact if firmware validation is enforced and network segmentation isolates the router.

🌐 Internet-Facing: HIGH - Routers are directly internet-facing and accessible via web interface.
🏢 Internal Only: MEDIUM - Requires access to router's admin interface, which may be accessible from internal networks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authentication to router admin interface. Public proof-of-concept demonstrates the bypass technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V1.0.10.94 and later

Vendor Advisory: https://kb.netgear.com/000065593/Security-Advisory-for-Firmware-Command-Injection-and-Unauthenticated-Firmware-Upload-on-Multiple-Products-PSV-2023-0014

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates. 4. Download and install V1.0.10.94 or later. 5. Reboot router after installation.

🔧 Temporary Workarounds

Disable remote administration

all

Prevents external access to router admin interface

Change default admin credentials

all

Mitigates risk if attacker gains network access

🧯 If You Can't Patch

  • Isolate router on separate VLAN with strict firewall rules
  • Implement network monitoring for unusual firmware update attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under Advanced > Administration > Firmware Update

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Confirm firmware version is V1.0.10.94 or later in admin interface

📡 Detection & Monitoring

Log Indicators:

  • Unexpected firmware upload events
  • Multiple failed login attempts followed by firmware update

Network Indicators:

  • Unusual HTTP POST requests to firmware update endpoint
  • Traffic patterns suggesting router compromise

SIEM Query:

source="router_logs" AND (event="firmware_update" OR uri="/FirmwareUpdate.htm")

🔗 References

📤 Share & Export