Updating netgear firmware
The Netgear GS724Tv4 firmware should not be updated, it should remain at 184.108.40.206.
This update process only modifies the switch's configuration settings. In the purple header row at the top of the LAG Configuration list select the check box to select all ports and select Disable for Admin Mode, STP Mode, and Link Trap.
But perhaps the most puzzling revelation (other than the exploit itself), is that Acew0rm, the hacker that discovered the security hole, notified Netgear about it more than four months ago.
Netgear never followed up once he made the company aware of the exploit, to which Acew0rm quipped, “I didn’t think it was going to this big and I thought they were going to instantly patch it.” Now that the details of VU#582384 are out in the open, Netgear has finally responded.
The security issue could have allowed anyone to completely take over affected routers with a malicious website or advertisement.
In the mean time, Netgear has issue beta firmware for the following five models — R6250, R6400, R6700, R7000 and R8000 — which “has not been fully tested and might not work for all users”.
The initial alert said that only Netgear R6400 and R7000 models were vulnerable, but users reported on Reddit that Netgear R8000 routers were also affected.
Netgear acknowledged the issue over the weekend, and today expanded the list and issued firmware updates.
This article describes how to update the Netgear GS724Tv4 switch configuration file to ensure proper AVB functionality with Tesira 2.4.2 (and higher) firmware releases.
Firmware version 2.4.2 and higher include some modifications to Biamp's AVB firmware that were required to attain certification with the AVnu Alliance.