Netgear has started releasing patches for ten vulnerabilities affecting nearly 80 of its products, including flaws disclosed last year at the Pwn2Own hacking competition.
All of the security holes were reported to Netgear through Trend Micro’s Zero Day Initiative (ZDI), including five by a hacker who uses the online moniker d4rkn3ss, from VNPT ISC, and five by Pedro Ribeiro and Radek Domanski of Team Flashback.
Ribeiro and Domanski disclosed the flaws at the Pwn2Own Tokyo 2019 hacking contest in November 2019, which earned them $25,000.
The vulnerabilities were reported to Netgear in November 2019 and January and February 2020. The vendor asked ZDI to extend its public disclosure deadline on two occasions saying that it needed more time to develop patches, but ZDI declined the second request and published its advisories with a “0day” status on June 15. No CVE identifiers have been assigned to the flaws.
The bugs disclosed at Pwn2Own, four of which have been rated high severity, can be exploited by an unauthenticated attacker with network access to the targeted Netgear device for arbitrary code execution, including with admin or root privileges, and to bypass authentication.
The vulnerabilities reported by d4rkn3ss can be exploited by a network-adjacent attacker for remote code execution and to obtain user credentials.
The Cybersecurity and Infrastructure Security Agency (CISA) has published an alert advising users and administrators to take action to prevent potential attacks, and CERT/CC has published an advisory describing one of the most serious vulnerabilities, which allows unauthenticated remote code execution with root privileges.
This vulnerability was also independently discovered by researchers at cybersecurity firm GRIMM, which has published a blog post describing the issue, along with proof-of-concept (PoC) exploit code.
Netgear’s advisory lists 79 devices as being affected, including routers, mobile routers, modems, gateways and extenders. The company has so far released patches for 28 devices, but CERT/CC noted that some products have reached end of life (EOL) and they may never receive fixes.
Related: Several Botnets Using Zero-Day Vulnerability to Target Fiber Routers
Related: DoS Vulnerabilities Patched in NETGEAR N300 Routers
Related: Flaws Affecting Top-Selling Netgear Routers Disclosed

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Google Patches Third Chrome Zero-Day of 2023
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
Latest News
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
- VMware Plugs Critical Flaws in Network Monitoring Product
- Google Patches Third Chrome Zero-Day of 2023
- Hackers Issue ‘Ultimatum’ Over Payroll Data Breach
