Netgear Nighthawk R6700v3 routers running the latest firmware are affected by multiple vulnerabilities. Details of the flaws were disclosed last week by Tenable after the vendor failed to release patches.
The most important of these security defects results in an authenticated attacker being able to inject commands that would be executed when the device checks for updates.
Tracked as CVE-2021-20173, the issue exists because unsanitized input is being sent to system() calls in the upnpd binary. The attacker can send requests from the SOAP interface to force update checks and trigger the execution of commands.
Furthermore, Tenable’s researchers discovered that communication to and from the device’s web and SOAP interfaces is not encrypted, meaning that sensitive information – such as usernames and passwords – is transmitted in cleartext.
The issues were assigned CVE identifiers CVE-2021-20174 and CVE-2021-20175, respectively.
Tenable also noticed that the device stores usernames and passwords in plaintext, including the admin password. The issue is tracked as CVE-2021-45077.
Another identified vulnerability (CVE-2021-23147) could allow an attacker with physical access to the device to connect to the UART port via a serial connection and run commands as root without authentication.
“We recommend disabling this UART console for production runs, or at least enforcing the same password mechanisms used for other functionality in the device (such as the web UI),” Tenable says.
Because encryption routines are hardcoded on the device (CVE-2021-45732), although configuration backups are encrypted, a user can leverage publicly available tools to extract the configuration and reconfigure settings that should not be changed.
Additionally, Tenable’s researchers discovered that the device uses instances of known vulnerable jQuery libraries, as well as a minidlna.exe iteration that contains publicly known vulnerabilities.
Netgear Nighthawk R6700v3 routers running firmware version 1.0.4.120 are known to be vulnerable. Tenable reported the bugs to Netgear at the end of September, but the vendor hasn’t released patches until now.
Related: Netgear Patches Code Execution Vulnerability Affecting Many Products
Related: NETGEAR Patches Severe Vulnerabilities in Business Switches
Related: Unpatched Flaws in Netgear Business Switches Expose Organizations to Attacks

More from Ionut Arghire
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- Apria Healthcare Notifying 2 Million People of Years-Old Data Breaches
- European Cybersecurity Firm Sekoia.io Raises $37.5 Million
- GitLab Security Update Patches Critical Vulnerability
- Android App With 50,000 Downloads in Google Play Turned Into Spyware via Update
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
