CVE-2021-37561

8.2 HIGH

📋 TL;DR

This vulnerability in MediaTek Wi-Fi chipsets allows attackers to execute arbitrary code via an out-of-bounds write in the WPS protocol implementation. Affected devices include NETGEAR routers and other products using specified MediaTek chipsets. The vulnerability requires proximity to the wireless network but can lead to complete device compromise.

💻 Affected Systems

Products:
  • NETGEAR routers with MediaTek chipsets
  • Other devices using affected MediaTek chipsets
Versions: Software version 7.4.0.0 and earlier
Operating Systems: Embedded firmware on affected devices
Default Config Vulnerable: ⚠️ Yes
Notes: Affects chipsets: MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full device compromise, persistence, network pivoting, and data interception

🟠

Likely Case

Device takeover enabling network monitoring, credential theft, and botnet recruitment

🟢

If Mitigated

Limited impact if WPS is disabled and proper network segmentation is implemented

🌐 Internet-Facing: HIGH - Routers are often internet-facing and WPS can be triggered remotely
🏢 Internal Only: MEDIUM - Requires wireless proximity but internal devices could be targeted

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires wireless proximity and WPS protocol interaction

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor-specific firmware updates

Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/January-2022

Restart Required: Yes

Instructions:

1. Check NETGEAR or device manufacturer website for firmware updates. 2. Download latest firmware for your model. 3. Upload via device admin interface. 4. Reboot device.

🔧 Temporary Workarounds

Disable WPS

all

Turn off Wi-Fi Protected Setup feature on affected devices

Network Segmentation

all

Isolate affected devices from critical network segments

🧯 If You Can't Patch

  • Disable WPS functionality immediately
  • Replace affected devices with non-MediaTek alternatives

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version against vendor advisories

Check Version:

Check device admin interface or use vendor-specific CLI commands

Verify Fix Applied:

Verify firmware version is updated beyond vulnerable version and WPS is disabled

📡 Detection & Monitoring

Log Indicators:

  • Unusual WPS protocol activity
  • Multiple failed WPS connection attempts
  • Firmware modification logs

Network Indicators:

  • Abnormal WPS traffic patterns
  • Unexpected device reboots
  • Suspicious outbound connections from router

SIEM Query:

device_type:router AND (event_type:wps_anomaly OR firmware_change)

🔗 References

📤 Share & Export