CVE-2026-0404 Overview
An insufficient input validation vulnerability in NETGEAR Orbi devices' DHCPv6 functionality allows network adjacent attackers authenticated over WiFi or on LAN to execute OS command injections on the router. This command injection vulnerability enables attackers with local network access and authentication to execute arbitrary operating system commands on affected NETGEAR Orbi mesh networking devices. DHCPv6 is not enabled by default, which limits the attack surface.
Critical Impact
Authenticated attackers on the local network can achieve full command execution on NETGEAR Orbi routers, potentially compromising the entire network infrastructure and all connected devices.
Affected Products
- NETGEAR RBR750 (Orbi Router)
- NETGEAR RBR840 (Orbi Router)
- NETGEAR RBR850 (Orbi Router)
- NETGEAR RBR860 (Orbi Router)
- NETGEAR RBRE950 (Orbi Router)
- NETGEAR RBRE960 (Orbi Router)
- NETGEAR RBS750 (Orbi Satellite)
- NETGEAR RBS840 (Orbi Satellite)
- NETGEAR RBS850 (Orbi Satellite)
- NETGEAR RBS860 (Orbi Satellite)
- NETGEAR RBSE950 (Orbi Satellite)
- NETGEAR RBSE960 (Orbi Satellite)
Discovery Timeline
- 2026-01-13 - CVE-2026-0404 published to NVD
- 2026-01-13 - Last updated in NVD database
Technical Details for CVE-2026-0404
Vulnerability Analysis
This vulnerability stems from improper input validation (CWE-20) in the DHCPv6 functionality of NETGEAR Orbi mesh networking devices. The attack requires adjacent network access, meaning the attacker must be connected to the same local network segment either via WiFi or wired LAN connection. Additionally, some level of authentication is required to exploit the vulnerability.
The exploitation occurs through the DHCPv6 protocol handler, which fails to properly sanitize user-controlled input before passing it to system commands. An attacker who can craft malicious DHCPv6 messages or interact with the DHCPv6 configuration interface can inject arbitrary OS commands that execute with the privileges of the router's operating system.
While DHCPv6 is not enabled by default on these devices, environments that have explicitly enabled IPv6 functionality are at risk. The adjacent network attack vector and authentication requirement provide some mitigation, but authenticated users or attackers who have compromised WiFi credentials can still exploit this vulnerability.
Root Cause
The root cause is insufficient input validation (CWE-20) in the DHCPv6 processing code. User-supplied data is passed directly to shell commands without proper sanitization or escaping, allowing specially crafted input containing shell metacharacters to break out of the intended command context and execute arbitrary commands.
Attack Vector
The attack vector requires adjacent network access, meaning the attacker must be on the same local network as the target Orbi device. This can be achieved by connecting to the WiFi network (with valid credentials) or having physical access to connect via Ethernet. Once on the network, an authenticated attacker can send malicious DHCPv6-related requests that contain command injection payloads in fields that are not properly validated.
The vulnerability exploitation flow involves:
- Attacker gains access to the local network (WiFi or LAN)
- Attacker authenticates to the device or leverages existing session
- Attacker sends crafted input to the DHCPv6 functionality
- Unvalidated input is passed to system shell
- Injected commands execute with router privileges
Detection Methods for CVE-2026-0404
Indicators of Compromise
- Unexpected processes spawning from DHCPv6-related services on Orbi devices
- Unusual outbound network connections originating from the router
- Modified configuration files or unexpected file system changes on the router
- Suspicious command patterns in router logs related to DHCPv6 processing
Detection Strategies
- Monitor network traffic for anomalous DHCPv6 packets or unusual patterns in IPv6 traffic
- Review router logs for signs of command injection attempts or unexpected shell command execution
- Implement network segmentation monitoring to detect lateral movement from compromised routers
- Deploy intrusion detection rules to identify command injection payloads in DHCPv6 traffic
Monitoring Recommendations
- Enable verbose logging on NETGEAR Orbi devices where available
- Monitor for unauthorized configuration changes on network infrastructure devices
- Implement network access control to limit who can connect to sensitive network segments
- Use SentinelOne Singularity for endpoint protection to detect post-exploitation activities on networked devices
How to Mitigate CVE-2026-0404
Immediate Actions Required
- Update all affected NETGEAR Orbi devices to the latest firmware version immediately
- Disable DHCPv6 functionality if not required for network operations
- Review and strengthen WiFi authentication credentials to limit network access
- Audit connected devices and remove any unauthorized or unknown clients from the network
Patch Information
NETGEAR has released a security advisory addressing this vulnerability. Users should consult the NETGEAR Security Advisory for specific firmware versions that address CVE-2026-0404. Firmware updates are available through the NETGEAR support pages for each affected device model:
Workarounds
- Disable DHCPv6 on the router if IPv6 is not required in your environment
- Implement strict network access controls to limit who can connect to the WiFi and LAN
- Use strong, unique WiFi passwords and consider implementing WPA3 where supported
- Segment IoT and guest devices onto separate VLANs with limited access to router management interfaces
# Configuration guidance
# Access your NETGEAR Orbi router admin interface
# Navigate to Advanced > IPv6 settings
# Disable DHCPv6 if not required
# Update firmware via Advanced > Administration > Firmware Update
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

