How to Fix The CVE-2021–40847? List of Netgear Routers Affected With The Remote Code Execution Vulnerability

List of Netgear Routers Affected With CVE-2021–40847 The Remote Code Execution Vulnerability:

  • R6400v2–1.0.4.106
  • R6700–1.0.2.16
  • R6700v3–1.0.4.106
  • R6900–1.0.2.16
  • R6900P — 1.3.2.134
  • R7000–1.0.11.123
  • R7000P — 1.3.2.134
  • R7850–1.0.5.68
  • R7900–1.0.4.38
  • R8000–1.0.4.68
  • RS400–1.5.0.68

What is CVE-2021–40847:

What are the implications of CVE-2021–40847?

How Attackers Abuse CVE-2021–40847 to enter Enterprise network?

  1. At first, attackers will launch reconnaissance attacks to find information like ISP, device model, version information.
  2. The attacker then may do phishing based on the information gathered during the first reconnaissance attacks.
  3. Then the attacker will try to join the network of the victim and compromise the router.
  4. Attackers use the compromised routers as part of a other attack chains. Example they can use the routers to connect to the corporate network for further exploitation.

How to Fix CVE-2021–40847?

  1. Visit the NETGEAR Support portal.
  2. Type your model number in the search box, then select your model from the drop-down menu as soon as it appears.
  3. Click Downloads.
  4. Under Current Versions, select the first download whose title begins with Firmware Version.
  5. Click Release Notes.
  6. Follow the instructions written in the firmware release notes to download and install the new firmware.
  • Create a strong and unique password:
  • Enable network encryption:
  • Filter the MAC addresses:
  • Reducing the wireless signal range:
  • Upgrade the router’s firmware:
  • Make use of guest network:

--

--

--

We are here to create awareness about cyber security.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The anatomy of a CTF challenge

Top tips for avoiding online scams

{UPDATE} Number Combo 2048 Hack Free Resources Generator

{UPDATE} down hill buss buss simulator Hack Free Resources Generator

Crashing Windows 10 devices using BadUSB

PRIORITIZING SECURITY: MULTI-LAYER CODE REVIEW WITH IMMUNEFI

Hardware as a Service (HaaS): A Five-Point Guide

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Thesecmasterblog

Thesecmasterblog

We are here to create awareness about cyber security.

More from Medium

What Is A Privilege Escalation Attack? How To Prevent Privilege Escalation Attacks?

How having a student mail can help you in Info-sec.

Get your own Hacking VPS for free in 2022!!

Exploiting Blind-XSS with Burp Collaborator Client.