Skip to content

Netgear’s budget-friendly router caught with critical security flaw

  • by
  • 2 min read

Security researchers have discovered six flaws in Netgear’s WNR614 N300 — one of its most popular, budget-friendly routers used among home and small business owners. The router reached end-of-life status in 2021 and is no longer actively supported by Netgear.

RedFox Security researchers found six vulnerabilities in the router. The affected variant is the Netgear WNR614 JNR1010V2 N300 running firmware version V1.1.0.54_1.0.1.

  • CVE-2024-36787: If exploited, this vulnerability allows an attacker to access the router’s administrative interface, allowing full control over the device.
  • CVE-2024-36788: If exploited, this vulnerability stems from an incorrect HTTPSOnly flag setting for cookies. If exploited, it allows an attacker to intercept and access sensitive information between the router and connected devices, emulating an MITM (Man In The Middle) attack.
  • CVE-2024-36789: The vulnerability allows attackers to create passwords violating security standards, even accepting single-character passwords.
  • CVE-2024-36790: Stems from the router saving passwords in plaintext. If exploited, the vulnerability can cause an unauthorised takeover of the router and, consequently, the network.
  • CVE-2024-36792: Stems from implementing WPS on the router, exposing the connecting PIN. If exploited, it can lead to unauthorised takeovers and manipulation.
  • CVE-2024-36795: Due to insecure permissions, attackers can access URLs and directories embedded in the router’s firmware. Can cause unauthorised network access and control.

Since Netgear no longer actively supports the router, it’s unlikely that any patches will be issued. Researchers recommend users swap out the N300 for a newer router supported by the manufacturer and with better security features. For those unable to switch immediately, the following mitigations are recommended.

  • Disable remote access to reduce the risk of unauthorised access
  • Use complex, long passwords and change them regularly
  • Disable WPS
  • Switch to WPA4
  • Restrict access to the router’s admin interface
  • Ensure the router uses HTTPS and enforce HTTPS traffic across the network
  • Separate the router from critical systems or infrastructure to limit damage from potential breaches.

In the News: UK and Canada launch joint probe into 23andMe data breach

Yadullah Abidi

Yadullah Abidi

Yadullah is a Computer Science graduate who writes/edits/shoots/codes all things cybersecurity, gaming, and tech hardware. When he's not, he streams himself racing virtual cars. He's been writing and reporting on tech and cybersecurity with websites like Candid.Technology and MakeUseOf since 2018. You can contact him here: yadullahabidi@pm.me.

>