CVE-2021-29078

9.6 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary commands on affected NETGEAR WiFi systems. It affects multiple Orbi mesh WiFi router models running firmware versions before 3.2.17.12. Attackers can exploit this without any authentication, potentially gaining full control of the device.

💻 Affected Systems

Products:
  • NETGEAR RBK852
  • NETGEAR RBK853
  • NETGEAR RBK854
  • NETGEAR RBR850
  • NETGEAR RBS850
  • NETGEAR RBK752
  • NETGEAR RBK753
  • NETGEAR RBK753S
  • NETGEAR RBK754
  • NETGEAR RBR750
  • NETGEAR RBS750
Versions: All firmware versions before 3.2.17.12
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: All affected devices are vulnerable in their default configurations. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent malware, intercept all network traffic, pivot to internal networks, or use the device as part of a botnet.

🟠

Likely Case

Attackers gain remote shell access to the router, enabling them to modify network settings, intercept traffic, or use the device for further attacks.

🟢

If Mitigated

With proper network segmentation and firewall rules, impact is limited to the compromised device only, preventing lateral movement.

🌐 Internet-Facing: HIGH - These are internet-facing routers that are directly accessible from the internet, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - If placed behind another firewall or in internal-only configurations, risk is reduced but still significant due to unauthenticated nature.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in the SOAP API endpoint and requires sending specially crafted HTTP requests. Public exploit code exists and is relatively simple to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.17.12 or later

Vendor Advisory: https://kb.netgear.com/000063009/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0511

Restart Required: Yes

Instructions:

1. Log into the router web interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install firmware version 3.2.17.12 or later. 4. The router will automatically reboot after installation.

🔧 Temporary Workarounds

Disable Remote Management

all

Disable remote management/administration features to prevent external exploitation.

Network Segmentation

all

Place affected routers behind a firewall that blocks external access to management interfaces.

🧯 If You Can't Patch

  • Replace affected devices with patched models or alternative vendors
  • Implement strict network access controls to limit exposure to the management interface

🔍 How to Verify

Check if Vulnerable:

Check current firmware version via router web interface: Advanced > Administration > Firmware Update

Check Version:

Check web interface or use: curl -s http://router-ip/currentsetting.htm | grep Firmware

Verify Fix Applied:

Verify firmware version is 3.2.17.12 or later in the router web interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to SOAP endpoints
  • Multiple failed authentication attempts followed by successful command execution
  • Unexpected system processes or services running

Network Indicators:

  • HTTP requests containing shell metacharacters or command injection patterns
  • Unusual outbound connections from router to external IPs
  • Port scanning or attack traffic originating from router

SIEM Query:

source="router-logs" AND (url="*soap*" AND (method="POST" AND (content="*;*" OR content="*|*" OR content="*`*" OR content="*$(*")))

🔗 References

📤 Share & Export