This vulnerability https://www.kb.cert.org/vuls/id/582384 certainly affects my router with stock firmware updated to latest. Anyone know if netgear is intending a fix any time soon. Apparently it was revealed to netgear 4 months ago.
Unlock lightning-fast Microsoft support with Magenium’s Premier Services+. Our expert team ensures seamless integration, proactive monitoring, and rapid issue resolution. Save up to 40% on costs while enjoying priority access to top-tier engineers. Experience unparalleled support today!
Recent comments
- After the initial Kong Mod 2 years 2 months ago
- Working the EXACT same 2 years 2 months ago
- While the "5 Easy Steps" 2 years 2 months ago
- R8000P would be grate to see. 2 years 2 months ago
- Have a R8000 but ordered a 2 years 2 months ago
no one can say at the moment how fast NG will push an update. But being familiar with them, it can take a few weeks or up to a month. I will be pleasantly surprised if they act very fast which will be good for all affected
Does anyone know if the same vulnerability exists in recent Tomato Shibby open firmware versions?
Terminate the web server process, with?:
http://<Router_IP_Address>;killall$IFS'httpd'
Likewise for DD-WRT Kong mod?
Only stock firmware is affected, not DDWRT or Tomato
Thanks.
Netgear has a beta update out today that fixes the issue.
https://www.netgear.com/support/product/R7000#Firmware Version 1.0.7.6 (Beta)
AntonK
Yes, after months of knowing about the issue AND after the person who discovered it went public, NG is finally moving its ass. Will make me thing twice or thrice before recommending NG to others
I wonder if they only responded after the slashdot article and my comment here seems a bit coincidental otherwise.