Netgear Releases Security Patches For Over 40 Router Models – What To Do

Do you have a Netgear router? I do, and like yours, mine probably needs to be fixed right away.

This is because enterprising folks at area security firm DC Grimm found another very serious flaw in Netgear, as detailed in a report yesterday (November 16). This comes (relatively) right after the previous batch of Netgear security updates in September of this year.

This time around, over 40 different models of Netgear routers, range extenders, and a few other devices, from models nearly a decade old to the brand new models on our list of the best Wi-Fi routers, need to install new ones. Firmware updates to protect against total takeover by hackers.

Unfortunately, nearly 40 other Netgear models may or may not receive updates, as some of them are already too old to receive any support.

We have a list of all affected models at the end of this story. In total, we’re looking at around 80 different models of Wi-Fi routers, Wi-Fi range extenders, DSL gateways, and other devices. The number of individual units affected should be at least several hundred thousand, and possibly several million.

How to update the firmware of your Netgear router

The newer your Netgear router, the easier it is to update the firmware. Netgear’s Orbi mesh routers typically update themselves, and they also have an associated smartphone app that you can use to check for and install updates.

Netgear’s Nighthawk routers also have a companion app, although its use is optional for at least some models, as is the auto update setting. With some Nighthawks it is usually best to go into the administrative interface (try “http://192.168.1.1/admin” or “routerlogin.net” while connected to your home network) and check the “Advanced” section. “for firmware updates. From there, you should be able to start the update sequence.

If the above methods do not work with your Netgear router, you need to go to Netgear support at https://www.netgear.com/support/ and enter your router’s model number in the search sorted by high. of the page. (We have more instructions here on how to update your router’s firmware.)

However, the model number may not be obvious. Some routers come with their brand and specifications proudly written on the box, such as “Nighthawk AXE11000 Tri-Band WiFi 6E”. But that’s not the model name, which is actually “RAXE500”. (This is the router pictured at the top of this story, and it needs to be fixed.)

Look for a sticker on the router itself displaying the model number – it can be on the side or on the bottom. To complicate matters further, Netgear sometimes modifies the internal circuitry of a router during the life of production, so you may see a “v2” or “v3” appended to the model number.

Once you have the model number, the search feature on the Netgear support site should take you to that model’s support page. Scroll down to find “Firmware and Software Downloads” and click on it.

You will then see a button that will allow you to download the firmware update to your PC or Mac. Do this, but don’t forget to click on the Release Notes link just below, which in turn will take you to a link that will take you to a downloadable version of your router’s user manual, which will show you how to install. firmware update. The firmware update itself may come with its own instructions.

So what is this Netgear flaw that is being fixed?

The fatal flaw in all of these models involves a stack overflow in the Universal Plug and Play component of the router’s firmware. Universal Plug and Play, or UPnP for short, is a protocol that allows newer devices, such as game consoles or printers, to connect to routers without much hassle.

It turns out that a character limit in a function of the UPnP protocol on all these Netgear routers allows an attacker on the local network – i.e. already logged in to your router as a regular user – d ‘send a malicious command to the router which overrides the internal routers backups and gives the router full control without any authorization.

Once done, the attacker can see just about anything you do online and can also send you to malicious websites or break into other devices on your network.

You might think that keeping intruders out of your network is enough to prevent such an attack, but it is not that difficult to crack a network access password or introduce malware into it. a poorly secured device, such as an obsolete device. computer or smart home device.

Suffice it to say that you want to install the Netgear firmware update on your router right away, if you can.

Netgear Routers with Firmware Patches Available

Here is a list, copied from the Netgear website, of the models for which firmware updates or “hot fixes” are available to fix this flaw, as well as the most recent firmware version to which they should. to be updated.

Routers:

  • R6400 corrected in firmware version 1.0.1.76
  • R6400v2 corrected in firmware version 1.0.4.120
  • R6700v3 corrected in firmware version 1.0.4.120
  • R6900P corrected in firmware version 1.3.3.142_HOTFIX
  • R7000 corrected in firmware version 1.0.11.128
  • R7000P corrected in firmware version 1.3.3.142_HOTFIX
  • R7100LG corrected in firmware version 1.0.0.72
  • R7850 corrected in firmware version 1.0.5.76
  • R7900P corrected in firmware version 1.4.2.84
  • R7960P fixed in firmware version 1.4.2.84
  • R8000 corrected in firmware version 1.0.4.76
  • R8000P fixed in firmware version 1.4.2.84
  • R8300 corrected in firmware version 1.0.2.156
  • R8500 corrected in firmware version 1.0.2.156
  • RAX15 corrected in firmware version 1.0.4.100
  • RAX20 corrected in firmware version 1.0.4.100
  • RAX200 corrected in firmware version 1.0.5.132
  • RAX35v2 corrected in firmware version 1.0.4.100
  • RAX38v2 corrected in firmware version 1.0.4.100
  • RAX40v2 corrected in firmware version 1.0.4.100
  • RAX42 corrected in firmware version 1.0.4.100
  • RAX43 corrected in firmware version 1.0.4.100
  • RAX45 corrected in firmware version 1.0.4.100
  • RAX48 corrected in firmware version 1.0.4.100
  • RAX50 corrected in firmware version 1.0.4.100
  • RAX50S corrected in firmware version 1.0.4.100
  • RAX75 corrected in firmware version 1.0.5.132
  • RAX80 corrected in firmware version 1.0.5.132
  • RAXE450 corrected in firmware version 1.0.8.70
  • RAXE500 corrected in firmware version 1.0.8.70
  • RS400 fixed in firmware version 1.5.1.80
  • WNDR3400v3 corrected in firmware version 1.0.1.42
  • WNR3500Lv2 fixed in firmware version 1.2.0.70
  • XR300 corrected in firmware version 1.0.3.68

DSL modem routers:

  • D6220 corrected in firmware version 1.0.0.76
  • D6400 corrected in firmware version 1.0.0.108
  • D7000v2 corrected in firmware version 1.0.0.76
  • DGN2200v4 corrected in firmware version 1.0.0.126

Wi-Fi Extensions:

  • EX3700 corrected in firmware version 1.0.0.94
  • EX3800 corrected in firmware version 1.0.0.94
  • EX6120 corrected in firmware version 1.0.0.66
  • EX6130 corrected in firmware version 1.0.0.66

Air Cards:

  • DC112A corrected in firmware version 1.0.0.62

Cable modems:

  • CAX80 fixed in firmware version 2.1.3.5

Netgear models that may or may not get a firmware update

Here is a list of Netgear models that the Grimm team has determined to be vulnerable to these attacks, but which Netgear has not specifically listed as getting fixes for this vulnerability. The firmware version numbers listed below ARE vulnerable, according to Grimm.

Unfortunately, there are models that Netgear lists as getting fixes that are not on Grimm’s list. And there are models listed below that are not supposed to receive patches, yet have received security fixes over the past few months that have pushed firmware versions beyond the vulnerable versions listed below.

To complicate matters further, there are six models that Grimm says are not vulnerable because previous firmware updates have “broken” UPnP. Four of them – D6220, D6400, R6400 and R7000 – received patches from Netgear to correct this most recent flaw. Two more, D8500 and R6300v2, did not and the only firmware updates available are the most vulnerable listed below.

The best thing to do, if you own any of the models listed below, is to follow the procedures above to check if a firmware update is available on the Netgear support site.

If the available firmware update has a version number later than the one below, then you can get a fix for the above flaw, especially if the flaw release note has a date within the last few months. . Go ahead and install the update.

But if the available firmware update version number matches the firmware number below, and the release note date is more than a few months old, it might be time to buy a new router. .

  • AC1450 – 1.0.0.36
  • D6300 – 1.0.0.102
  • D8500 – 1.0.3.60
  • DGN2200M – 1.0.0.35
  • DGND3700v1 – 1.0.0.17
  • EX3920 – 1.0.0.88
  • EX6000 – 1.0.0.44
  • EX6100 – 1.0.2.28
  • EX6150 – 1.0.0.46
  • EX6920 – 1.0.0.54
  • EX7000 – 1.0.1.94
  • MVBR1210C – 1.2.0.35BM
  • R4500 – 1.0.0.4
  • R6200 – 1.0.1.58
  • R6200v2 – 1.0.3.12
  • R6250 – 1.0.4.48
  • R6300 – 1.0.2.80
  • R6300v2 – 1.0.4.52
  • R6700 – 1.0.2.16
  • R6900 – 1.0.2.16
  • R7300DST – 1.0.0.74
  • R7900 – 1.0.4.38
  • WGR614v9 – 1.2.32
  • WGT624v4 – 2.0.13
  • WNDR3300v1 – 1.0.45
  • WNDR3300v2 – 1.0.0.26
  • WNDR3400v1 – 1.0.0.52
  • WNDR3400v2 – 1.0.0.54
  • WNDR3700v3 – 1.0.0.42
  • WNDR4000 – 1.0.2.10
  • WNDR4500 – 1.0.1.46
  • WNDR4500v2 – 1.0.0.72
  • WNR834Bv2 – 2.1.13
  • WNR1000v3 – 1.0.2.78
  • WNR2000v2 – 1.2.0.12
  • WNR3500 – 1.0.36NA
  • WNR3500v2 – 1.2.2.28NA
  • WNR3500L – 1.2.2.48NA

About Ferdinand Caldwell

Check Also

7 high-speed Wi-Fi routers from D-Link, Tenda, Xiaomi and more under 2,000 rupees

Internet is a necessity in today’s world. There’s not much you can do on your …