CVE-2021-29067

9.6 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication on affected NETGEAR WiFi systems, potentially gaining unauthorized access to network settings and connected devices. It affects multiple NETGEAR Orbi WiFi 6 and WiFi 5 mesh systems running outdated firmware versions.

💻 Affected Systems

Products:
  • NETGEAR RBW30
  • RBS40V
  • RBK852
  • RBK853
  • RBK854
  • RBR850
  • RBS850
  • RBK752
  • RBK753
  • RBK753S
  • RBK754
  • RBR750
  • RBS750
Versions: RBW30 before 2.6.2.2, RBS40V before 2.6.2.4, all other models before 3.2.17.12
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both WiFi 5 and WiFi 6 Orbi mesh systems. The vulnerability exists in the web administration interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network compromise allowing attackers to reconfigure network settings, intercept traffic, install malware on connected devices, and use the network as a pivot point for further attacks.

🟠

Likely Case

Unauthorized access to router administration interface leading to network configuration changes, DNS hijacking, or credential theft from connected devices.

🟢

If Mitigated

Limited impact if network segmentation is implemented and the device is not internet-facing, though local network access could still be compromised.

🌐 Internet-Facing: HIGH - Directly exposed devices can be exploited remotely without authentication, leading to immediate network compromise.
🏢 Internal Only: HIGH - Even internally, the authentication bypass allows any local attacker to gain administrative access to the device.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities are typically easy to exploit. Public advisories and CVSS 9.6 score suggest weaponization is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: RBW30: 2.6.2.2, RBS40V: 2.6.2.4, all other models: 3.2.17.12 or later

Vendor Advisory: https://kb.netgear.com/000063017/Security-Advisory-for-Authentication-Bypass-on-Some-WiFi-Systems-PSV-2020-0492

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and apply the latest firmware. 4. Reboot the device after update completes.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevents external exploitation by disabling remote access to the admin interface

Network Segmentation

all

Isolate the router management interface to a separate VLAN with restricted access

🧯 If You Can't Patch

  • Disable WAN access to admin interface and restrict LAN access to trusted IPs only
  • Implement network monitoring for unauthorized access attempts to router admin pages

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under Advanced > Administration > Firmware Update

Check Version:

No CLI command - check via web interface at http://[router-ip]

Verify Fix Applied:

Confirm firmware version matches or exceeds patched versions listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to admin pages
  • Multiple failed login attempts followed by successful access
  • Configuration changes from unexpected IP addresses

Network Indicators:

  • HTTP requests to router admin pages from external IPs
  • Unusual traffic patterns to/from router management interface

SIEM Query:

source_ip=external AND (url_path CONTAINS "/cgi-bin/" OR url_path CONTAINS "/admin/") AND dest_ip=router_ip

🔗 References

📤 Share & Export