Protect Your NETGEAR Router: Critical Remote Code Execution Flaw Discovered

CVSScvssV3_1: 9.8

NETGEAR has disclosed a serious remote code execution vulnerability affecting its ProSAFE Network Management System. The flaw could allow unauthenticated remote attackers to execute arbitrary code on affected devices.

The vulnerability resides in the Java Debug Wire Protocol (JDWP) debugger interface, which listens on port 11611 by default without authentication. This exposes a debugging port that provides detailed information about the Java runtime environment and allows execution of code.

Attackers can connect to this port and use the JDWP protocol to execute code of their choice with full privileges on the underlying operating system. This gives them complete control of the device.

NETGEAR devices are often internet-facing, so this vulnerability could be exploited remotely without user interaction. An attacker scanning for open JDWP ports could exploit affected NETGEAR routers without the owner’s knowledge.

If you have a NETGEAR router, you should update its firmware to the latest version released by NETGEAR. This will likely patch the vulnerability. You can also disable the JDWP interface in your router’s settings if a firmware update is not available.

It’s also recommended to change your router’s default administrative password to a strong, unique one. This helps prevent unauthorized access if other flaws are discovered. Enabling firewall rules to block inbound connections to port 11611 adds an extra layer of protection.

Staying up-to-date on firmware and disabling unneeded services helps secure your home network. Be sure to update your NETGEAR router or contact NETGEAR for support if an update is not available yet.