CVE-2023-36187
📋 TL;DR
A buffer overflow vulnerability in NETGEAR R6400v2 routers allows remote unauthenticated attackers to execute arbitrary code by sending a specially crafted URL to the httpd service. This affects all R6400v2 routers running firmware versions before 1.0.4.118. Attackers can potentially take full control of affected routers without authentication.
💻 Affected Systems
- NETGEAR R6400v2
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of router with persistent backdoor installation, credential theft, network traffic interception, and pivot to internal network devices.
Likely Case
Router takeover leading to DNS hijacking, credential harvesting, and use as botnet node for DDoS attacks.
If Mitigated
Limited impact if router is behind firewall with restricted WAN access, though internal network exposure remains.
🎯 Exploit Status
Exploitation requires sending crafted HTTP request to router's web interface. No authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.4.118
Vendor Advisory: https://kb.netgear.com/000065571/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0578
Restart Required: Yes
Instructions:
1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates or manually download firmware 1.0.4.118 from NETGEAR support site. 4. Upload and install firmware. 5. Router will reboot automatically.
🔧 Temporary Workarounds
Disable Remote Management
allPrevents external access to router's web interface
Log into router admin > Advanced > Remote Management > Disable
Restrict WAN Access
allBlock external access to router's web interface via firewall rules
Configure firewall to block incoming connections to router IP on ports 80/443
🧯 If You Can't Patch
- Replace router with patched model or different vendor
- Place router behind dedicated firewall with strict inbound rules
🔍 How to Verify
Check if Vulnerable:
Check firmware version in router admin interface under Advanced > Administration > Firmware Update
Check Version:
curl -s http://router-ip/currentsetting.htm | grep firmware
Verify Fix Applied:
Confirm firmware version shows 1.0.4.118 or higher after update
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests to router web interface
- Multiple failed login attempts followed by buffer overflow patterns
Network Indicators:
- Unusual outbound connections from router
- DNS queries to suspicious domains from router
SIEM Query:
source="router.log" AND (http_uri CONTAINS "overflow" OR http_uri LENGTH > 1000)