Technology content trusted in North America and globally since 1999
8,345 Reviews & Articles | 63,611 News Posts

Netgear routers allowing hackers to pass administrator authentication

Network engineer Peter Adkins has found a major security flaw in Netgear wireless routers - enabling full access over Wi-Fi
By: Chris Smith | Hacking & Security News | Posted: Feb 17, 2015 10:12 pm

A recent flaw has been discovered in multiple Netgear router models, reportedly allowing hackers to bypass administrator authentication and gain full access to the device as found by Network engineer, Peter Adkins.




Adkins discovered that routers in the popular Netgear 'WNDR' range are running a Simple Object Access Protocol (SOAP) service as part of the Netgear Genie device administration application. Seemingly secure, he was able to bypass filtering and authentication for the SOAP service over a Wi-Fi connection without much effort.


Once the connection had been established, Adkins was able to extract the admin password, Wi-Fi interface credentials, station identifiers, the device serial number and even information on connected clients. He then notified Netgear of this security issue, however was met with a response which included "the network should still stay secure" - apparently due to hidden built-in security features.


If you wish to view more in-depth information about this vulnerability, Adkins has released an analysis on Github. We'll also list below exactly what routers have been tested and confirmed to contain this issue.


Confirmed vulnerable routers:

  • NetGear WNDR3700v4 - V1.0.0.4SH
  • NetGear WNDR3700v4 - V1.0.1.52
  • NetGear WNR2200 - V1.0.1.88
  • NetGear WNR2500 - V1.0.0.24
  • NetGear WNDR3700v2 - V1.0.1.14
  • NetGear WNDR3700v1 - V1.0.16.98
  • NetGear WNDR3700v1 - V1.0.7.9
  • NetGear WNDR4300 - V1.0.1.60


Routers believed to be vulnerable but not yet tested:

  • WNDR3800
  • WPN824N
  • WNDR4700


Related Tags

Got an opinion on this news? Post a comment below!