

Netgear barely uses the actual model numbers in its consumer marketing and packaging, which doesn't help when its customers have to scramble to figure out whether their model needs a security update.įor example, the R8000P, one of the models that currently has a cross-site-scripting flaw, is marketed as the " AC4000 Nighthawk X6S Tri-Band WiFi Router with MU-MIMO." Netgear does a terrible job of communicating to its customers exactly what each router's model number actually is. A virtual router can share your VPN connections with other devices.Suffice it to say if your model appears in the table below, but not in the lists of the more severe flaws above, then it's got one of these cross-site scripting flaws. There are too many routers affected to list in this paragraph. We're just guessing here, as Netgear isn't providing details.īut Netgear has given all these "medium" severity scores of 6/10. This flaw affects the D6200 and D7000 modem-routers, the PR2000 Wi-Fi range extender and the R6050, JR6150, R6120, R6220, R6230, R6260, R6700v2, R6800 and R6900v2 routers.Ībout 20 flaws involve "stored cross-site scripting," which may mean that someone could add unauthorized commands to the router's administrative interface, provided they have the administrative passwords in the first place. That may be a danger to other devices connected to the network, but probably not to the router itself. Netgear's description of the flaw is pretty vague, but given the 6.8/10, "medium" severity score, it implies that an outside attacker could gain unauthorized access to your home Wi-Fi network. Moderately dangerous is an " authentication bypass security vulnerability" on 11 routers and gateways and one range extender. A router VPN is the best way to secure your Wi-Fi at home.
