![Summit zyxel firmware](https://kumkoniak.com/11.jpg)
The Sec Consult advisory names 38 products from Netgear, 39 from TP-Link, 14 from Trendnet, 4 four ZyXEL and 1 from D-Link that are likely vulnerable. The affected products have not been named, but the company is working on a public announcement about the issue. The company has identified four affected products and estimates that patches for them will be released in June. ZyXEL has developed a fix for the vulnerability and is in the process of rebuilding the NetUSB modules, a company representative said Thursday via email. Netgear advised users to scan their computers for malware regularly and to enable the firewall feature in their operating systems as a precaution.
![summit zyxel firmware summit zyxel firmware](https://media.threatpost.com/wp-content/uploads/sites/103/2021/01/06104825/Screen-Shot-2021-01-06-at-10.25.06-AM.png)
That advice might be of little use to small businesses like bars or restaurants that might be using Netgear routers and need to share the Wi-Fi password with customers and guests.Įven on home networks, where access is more strictly controlled, if attackers compromise a computer that's inside the network - for example, through malware - they could use it to compromise the router from within. It also recommends that they change the default password for the router to prevent unauthorized devices from accessing their network. Netgear said its customers should make sure that Wi-Fi security is turned on, which is the default setting on its routers and gateways. The NetUSB service can't be manually disabled on Netgear routers and the port it uses cannot be firewalled, the Sec Consult researchers said in a blog post. That's quite a long time for Netgear routers to remain vulnerable, considering that there is no workaround available. The company has not yet revealed the number of affected products or their names, but said that it plans to start releasing firmware updates in the third quarter of the year. The vulnerability, which concerns the ReadySHARE feature in Netgear products, can only be exploited from inside the local area network, not remotely from the Internet, Netgear said in an emailed statement. Only TP-Link had begun to release patches by the time the vulnerability was publicly disclosed Tuesday, but many other manufacturers had received advanced notice through the CERT Coordination Center. Products from 21 other vendors might be affected as well.
![summit zyxel firmware summit zyxel firmware](https://www.centurylink.com/content/dam/home/help/images/modems/product-images/zyxel-c3510xz-front-lights-back-ports.png)
The vulnerability can be exploited to execute malicious code on vulnerable devices with the highest possible privilege, leading to a complete compromise.īased on firmware scans, the Sec Consult researchers believe that over 90 products from D-Link, Netgear, TP-Link, Trendnet and ZyXEL are likely vulnerable.
Researchers from a company called Sec Consult found a buffer overflow vulnerability in the NetUSB service, which listens for connecting clients on TCP port 20005.
![Summit zyxel firmware](https://kumkoniak.com/11.jpg)