This vulnerability https://www.kb.cert.org/vuls/id/582384 certainly affects my router with stock firmware updated to latest. Anyone know if netgear is intending a fix any time soon. Apparently it was revealed to netgear 4 months ago.
Rehabilitation, underground utilities, sewer installation and repair
American Sewer and Utilities has consistently demonstrated excellence in the design and construction of a myriad of projects encompassing underground utilities, site development, leach fields, pump stations, landscaping, sanitary sewer, and municipal & residential rehabilitation. Our distinguished team comprises seasoned professionals and skilled artisans, dedicated to providing superior construction consultation and management servicesRecent comments
- After the initial Kong Mod 11 months 3 days ago
- Working the EXACT same 11 months 3 days ago
- While the "5 Easy Steps" 11 months 2 weeks ago
- R8000P would be grate to see. 11 months 2 weeks ago
- Have a R8000 but ordered a 11 months 2 weeks ago
no one can say at the moment how fast NG will push an update. But being familiar with them, it can take a few weeks or up to a month. I will be pleasantly surprised if they act very fast which will be good for all affected
Does anyone know if the same vulnerability exists in recent Tomato Shibby open firmware versions?
Terminate the web server process, with?:
http://<Router_IP_Address>;killall$IFS'httpd'
Likewise for DD-WRT Kong mod?
Only stock firmware is affected, not DDWRT or Tomato
Thanks.
Netgear has a beta update out today that fixes the issue.
https://www.netgear.com/support/product/R7000#Firmware Version 1.0.7.6 (Beta)
AntonK
Yes, after months of knowing about the issue AND after the person who discovered it went public, NG is finally moving its ass. Will make me thing twice or thrice before recommending NG to others
I wonder if they only responded after the slashdot article and my comment here seems a bit coincidental otherwise.