These firmware modifications necessitate changes to the Netgear switch configuration.
This article is for users with Netgear GS724Tv4 switches in an existing system which is being updated.
Netgear switches shipped from Biamp after February 8, 2016 should have the correct configuration file already installed.
These include the R6250, R6700, R6900, R7100LG, R7300, R7900, D6220 and D7000.
In the mean time, Netgear has issue beta firmware for the following five models — R6250, R6400, R6700, R7000 and R8000 — which “has not been fully tested and might not work for all users”.
But perhaps the most puzzling revelation (other than the exploit itself), is that Acew0rm, the hacker that discovered the security hole, notified Netgear about it more than four months ago.
Netgear never followed up once he made the company aware of the exploit, to which Acew0rm quipped, “I didn’t think it was going to this big and I thought they were going to instantly patch it.” Now that the details of VU#582384 are out in the open, Netgear has finally responded.
A remote attacker can potentially inject arbitrary commands which are then executed by the system,” wrote the company in a security advisory on its website.
What’s interesting is that in addition to the three above routers that we know are susceptible to the remote exploit, Netgear revealed that there are actually 8 additional models that are affected.
The initial alert said that only Netgear R6400 and R7000 models were vulnerable, but users reported on Reddit that Netgear R8000 routers were also affected.