NETGEAR fixes DoS vulnerabilities in its N300 routers

NETGEAR has released a firmware update for its N300 series routers that fixes two dangerous DoS vulnerabilities.

Their exploitation allowed unauthorized attackers to send SOAP and HTTP requests and cause a denial of service to the device. Researchers from the Cisco Talos team discovered the vulnerabilities.

“The N300 is a small and affordable wireless router that contains the basic features of a wireless router. An attacker could exploit these bugs by sending specific SOAP and HTTP requests to different functions of the router, causing it to crash entirely”, — reported Dave McDaniel, Cisco Talos specialist.

The N300 (WNR2000v5) product is pitched at the consumer and home office markets and are designed to provide basic internet access with speeds of up to 300 Mbps.

The first vulnerability (CVE-2019-5054) affects NETGEAR N300 HTTP Server session processing functionality (WNR2000v5). Exploitation occurs by sending an unauthorized attacker a specially crafted HTTP request.

“An HTTP request with an empty User-Agent string sent to the authentication page can cause the dereference of the null pointer and the HTTP service to fail”, – the researchers explained.

The second DoS vulnerability (CVE-2019-5055) affects the Host Access Point Daemon (hostapd) service of the N300 Wireless Router (WNR2000v5). Null pointer dereferencing and hostapd service failure can be caused by sending a SOAP request to the service in an invalid sequence.

Read also: NetCAT Vulnerability Threats Intel Server Processors

Both vulnerabilities were discovered in the NETGEAR N300 WNR2000v5 firmware version 1.0.0.70.

Netgear told that it had “addressed the issue as it was an older SKU that required a security patch which is currently available”.

Netgear and Cisco Talos fairly well coordinated public disclosure. A firmware update that addresses DoS vulnerabilities has been released and users are encouraged to install it as soon as possible to reduce the risk of exploit.
Exit mobile version