Patching Up The Latest Netgear Router Security Vulnerability

Netgear Security Vulnerability Patch Up

Another day, another huge batch of network security issues for stock router firmware. This time it is one of the top router manufacturers around – Netgear.

Netgear has just announced 50 security vulnerability patches for its routers, switches, NAS devices, and wireless access points. These router issues include cross-site-scripting problems on smart home switches. Furthermore, more severe vulnerabilities such as remote hijacking are a concern for users of default Netgear firmware.

Of the 50 security vulnerabilities, 20 of these patches address high-risk situations while the other 30 address medium security risks. Use Netgear’s security advisory page for the latest stock firmware vulnerability and security updates.

Vulnerable Stock Firmware Netgear Routers

Many of these security risks affect consumer grade routers such as:

     
D6100R6250R7500D6220R6300v2
R7500v2D6400R6400R7800D7000
R6400v2R7900D8500R6700R8000
JNR1010v2R6900R8300JWNR2010v5R6900P
R7000P/R6900PWNDR3700v5R6200v2R7100LGWNR1000v4
R6220R7300WNR2020WNR2050WNR614
R8500PR2000R7000R9000R6050/JR6150

*Bold indicates DD-WRT supported models

The Good News?

Thankfully, none of these vulnerabilities were discovered by hackers, as security researchers have reported the flaws directly to Netgear. Netgear has addressed these issues in a timely manner. Additionally, Netgear released updates to their firmware that should keep your wireless network safe, unlike other router manufacturers.

These firmware updates can be installed relatively easily if you have stock Netgear firmware. Netgear provides instructions to guide you through the firmware upgrading process.

It is important to keep your router’s firmware up to date because new security flaws are being found and fixed every so often. With all your devices in your home being connected to the Internet via your router, checking for new firmware regularly can protect your information from being compromised.

The Better News for DD-WRT Netgear Users!

Here at FlashRouters, we rarely have issues with security flaws and vulnerabilities. Every router that gets shipped out comes updated and pre-flashed with aftermarket, enhanced open-source firmware such as DD-WRT or Tomato.

Open-source firmware gets its name from having an openly available firmware code that is available for the public to see. This reduces the risk of government backdoors and potential malware that could be installed onto stock router firmware.

According to CVE Details, a database for security vulnerabilities, the current iteration of DD-WRT and Tomato firmware are not affected by these flaws that are evident in stock firmware.

With some of the affected routers being the Netgear R7000, R7800, and R9000, it is recommended that you make the switch to an open-source firmware immediately with the remote help of our support plans.

This would never be a problem with our custom flashed Netgear routers, as they already come with DD-WRT or Tomato firmware.

2 thoughts on “Patching Up The Latest Netgear Router Security Vulnerability

  1. Bob

    I have a newnetgear r9000 ypu flashed and installed NORDVPN with WW-WRT. I have a few questions.
    1-should I update my new router with Netgears firmware
    update?
    2-How do I setup NORDVPNwith Netgear (router?
    3-does this WW-WRT or NORDVPN make this a proxy server on my windows 7?
    4- do I follow Netgears genie instructions to set this router Up? Or, do I have to do something differnt since its flashed and VPN installed??

    Reply
    1. admin

      Hey Bob,

      Thanks for your question but by having DD-WRT you can completely ignore these updates as these flaws don’t exist. DD-WRT does not work with the Netgear Genie either.

      If you have any further questions and are looking for the speediest reply, please contact us via https//www.flashrouters.com/support

      Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.