NETGEAR R6250 prior to 1.0.4.6.Beta, R6400 prior to 1.0.1.18.Beta, R6700 prior to 1.0.1.14.Beta, R6900, R7000 prior to 1.0.7.6.Beta, R7100LG prior to 1.0.0.28.Beta, R7300DST prior to 1.0.0.46.Beta, R7900 prior to 1.0.1.8.Beta, R8000 prior to 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote malicious users to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
netgear r6400_firmware |
||
netgear r8000_firmware |
||
netgear d6220_firmware |
||
netgear r7000_firmware |
||
netgear r7100lg_firmware |
||
netgear r6700_firmware |
||
netgear r6900_firmware |
||
netgear d6400_firmware |
||
netgear r6250_firmware |
||
netgear r7300dst_firmware |
||
netgear r7900_firmware |
Yet another variant of the Mirai botnet has appeared on the scene, but this one has a twist: The code is integrated with at least three exploits that target unpatched IoT devices, including closed-circuit cameras and Netgear routers. It also has ties to a web of other botnets, made for DDoS attacks, which can all be traced back to one threat actor.
The original Mirai used traditional brute-force attempts to gain access to connected things in order to enslave them, but the Wicked Botnet, na...