CVE-2021-29073

7.6 HIGH

📋 TL;DR

This CVE describes a stack-based buffer overflow vulnerability in certain NETGEAR routers and WiFi systems that allows an authenticated attacker to execute arbitrary code. The vulnerability affects multiple NETGEAR device models running outdated firmware versions. An attacker with valid credentials could potentially take control of affected devices.

💻 Affected Systems

Products:
  • NETGEAR R8000P
  • NETGEAR MK62
  • NETGEAR MR60
  • NETGEAR MS60
  • NETGEAR R7960P
  • NETGEAR R7900P
  • NETGEAR RAX15
  • NETGEAR RAX20
  • NETGEAR RAX45
  • NETGEAR RAX50
  • NETGEAR RAX75
  • NETGEAR RAX80
  • NETGEAR RAX200
Versions: R8000P before 1.4.1.66, MK62 before 1.0.6.110, MR60 before 1.0.6.110, MS60 before 1.0.6.110, R7960P before 1.4.1.66, R7900P before 1.4.1.66, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RAX200 before 1.0.3.106
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. Affects both consumer and small business router models.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent malware, intercept network traffic, pivot to internal networks, or brick the device.

🟠

Likely Case

Attacker gains remote code execution on the router, potentially enabling traffic interception, credential theft, or using the device as a foothold for further attacks.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the affected device only, preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires valid credentials, making it post-authentication. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R8000P 1.4.1.66, MK62 1.0.6.110, MR60 1.0.6.110, MS60 1.0.6.110, R7960P 1.4.1.66, R7900P 1.4.1.66, RAX15 1.0.2.82, RAX20 1.0.2.82, RAX45 1.0.2.72, RAX50 1.0.2.72, RAX75 1.0.3.106, RAX80 1.0.3.106, RAX200 1.0.3.106

Vendor Advisory: https://kb.netgear.com/000063013/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-WiFi-Systems-PSV-2020-0212

Restart Required: Yes

Instructions:

1. Log into NETGEAR router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install latest firmware. 4. Reboot router after update completes.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to trusted IP addresses only

Strong Authentication

all

Use complex, unique passwords for router admin accounts and enable multi-factor authentication if available

🧯 If You Can't Patch

  • Segment affected routers from critical internal networks using VLANs or separate physical networks
  • Implement strict access controls and monitor for unusual authentication attempts to router admin interface

🔍 How to Verify

Check if Vulnerable:

Check current firmware version in router admin interface under Advanced > Administration > Firmware Update

Check Version:

Check via web interface: Advanced > Administration > Firmware Update

Verify Fix Applied:

Confirm firmware version matches or exceeds patched versions listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login
  • Unusual process execution or memory usage patterns on router
  • Unexpected firmware modification attempts

Network Indicators:

  • Unusual outbound connections from router
  • Traffic redirection or DNS manipulation
  • Unexpected administrative access from external IPs

SIEM Query:

source="router_logs" AND (event_type="authentication" AND result="success") AND src_ip NOT IN [trusted_admin_ips]

🔗 References

📤 Share & Export