CVE-2023-36187

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in NETGEAR R6400v2 routers allows remote unauthenticated attackers to execute arbitrary code by sending a specially crafted URL to the httpd service. This affects all R6400v2 routers running firmware versions before 1.0.4.118. Attackers can potentially take full control of affected routers without authentication.

💻 Affected Systems

Products:
  • NETGEAR R6400v2
Versions: All versions before 1.0.4.118
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default configurations. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router with persistent backdoor installation, credential theft, network traffic interception, and pivot to internal network devices.

🟠

Likely Case

Router takeover leading to DNS hijacking, credential harvesting, and use as botnet node for DDoS attacks.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access, though internal network exposure remains.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing by design, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - If router is not internet-facing, risk reduces but still exists from compromised internal devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted HTTP request to router's web interface. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.4.118

Vendor Advisory: https://kb.netgear.com/000065571/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0578

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates or manually download firmware 1.0.4.118 from NETGEAR support site. 4. Upload and install firmware. 5. Router will reboot automatically.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevents external access to router's web interface

Log into router admin > Advanced > Remote Management > Disable

Restrict WAN Access

all

Block external access to router's web interface via firewall rules

Configure firewall to block incoming connections to router IP on ports 80/443

🧯 If You Can't Patch

  • Replace router with patched model or different vendor
  • Place router behind dedicated firewall with strict inbound rules

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under Advanced > Administration > Firmware Update

Check Version:

curl -s http://router-ip/currentsetting.htm | grep firmware

Verify Fix Applied:

Confirm firmware version shows 1.0.4.118 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to router web interface
  • Multiple failed login attempts followed by buffer overflow patterns

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains from router

SIEM Query:

source="router.log" AND (http_uri CONTAINS "overflow" OR http_uri LENGTH > 1000)

🔗 References

📤 Share & Export