A flaw in Netgear wireless routers allows attackers to bypass administrator authentication and potentially gain full access to the devices, a researcher has discovered.
Network engineer Peter Adkins found several routers in the popular Netgear WNDR range run Simple Object Access Protocol (SOAP) service as part of the Netgear Genie device administration application.
Despite appearing to be secure, Adkins was able to bypass filtering and authentication for the SOAP service with relative ease over wi-fi.
Through the SOAP service, he was able to extract the admin password for Netgear WNDR routers, wi-fi interface credentials and station identifiers, and other information such as the device serial number and connected clients, he said.
Adkins said he notified Netgear about the router takeover flaw, but was told by the vendor's support department that "the network should still stay secure", thanks to a number of unspecified built-in security features.
Adkins said he received no further response from Netgear on the vulnerability. He has published a proof of concept and detailed analysis document on Github.
Netgear wireless routers tested and found vulnerable:
- WNDR3700v4 - V184.108.40.206SH
- WNDR3700v4 - V220.127.116.11
- WNR2200 - V18.104.22.168
- WNR2500 - V22.214.171.124
- WNDR3700v2 - V126.96.36.199
- WNDR3700v1 - V188.8.131.52
- WNDR3700v1 - V184.108.40.206
- WNDR4300 - V220.127.116.11
Netgear routers believed also to be vulnerable