Article Details

Original Article Text

Click to Toggle View

Netgear WNR614 flaws allow device takeover, no fix available. Researchers found half a dozen vulnerabilities of varying severity impacting Netgear WNR614 N300, a budget-friendly router that proved popular among home users and small businesses. The device reached end-of-life (EoL) and is no longer supported by Netgear but it's still present in many environments due to its reliability, ease of use, and performance. Researchers at RedFox Security discovered in the router six vulnerabilities that range from authentication bypass and weak password policy to storing passwords in plain text and Wi-Fi Protected Setup (WPS) PIN exposure: CVE-2024-36787: allows an attacker to bypass authentication and access the administrative interface via unspecified vectors. The flaw enables unauthorized access to the router's settings, posing a severe threat to network security and sensitive user data. CVE-2024-36788: the router has improper setting of the HTTPOnly flag for cookies. An attacker could leverage the vulnerability to intercept and access sensitive communications between the router and the devices connecting to it. CVE-2024-36789: allows attackers to create passwords that do not comply with proper security standards and even accept a single character as a password for the administrator account. This could lead to unauthorized access, network manipulation, and potential data exposure. CVE-2024-36790: the router stores credentials in plain text, which makes it easy for an attacker to gain unauthorized access, manipulate the router, and expose sensitive data. CVE-2024-36792: the implementation of the WPS Wi-Fi feature allows attackers to gain access to the router's PIN. This exposes the router to potential unauthorized access and manipulation. CVE-2024-36795: insecure permissions that allow attackers to access URLs and directories embedded within the router's firmware. This heightens the risk of unauthorized network access and control. Since the router has reached EoL, Netgear is not expected to release security updates for the vulnerabilities. If replacing the device is not an option at the moment, users are strongly advised to apply mitigatations that could help prevent attacks: However, users that still rely on Netgear WNR614 should consider replacing it with a model that is actively supported by its manufacturer and provides better security.

Daily Brief Summary

MALWARE // Critical Security Vulnerabilities Found in Netgear WNR614 Router

Researchers at RedFox Security identified six significant vulnerabilities in the Netgear WNR614 N300 router, affecting numerous users.

These flaws range from authentication bypasses and weak password policies to plain text storage of passwords and exposure of WPS PINs.

Key vulnerabilities include unauthorized administrative access, interception of sensitive data, and potential for network manipulation.

The identified router model has reached end-of-life (EoL) status and is no longer supported by Netgear, meaning no fixes will be issued.

Despite its discontinuation, the WNR614 remains widely used in home and small business environments due to its previously noted reliability.

For users unable to replace their outdated devices immediately, applying specific mitigations to prevent exploitation is highly recommended.

Ultimately, users are encouraged to switch to actively supported router models to ensure network security and protect sensitive data.