CVE-2021-41449

7.1 HIGH

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to perform path traversal attacks on Netgear RAX35, RAX38, and RAX40 routers, enabling access to sensitive restricted files via specially crafted HTTP packets. Attackers can read forbidden files from the web application without authentication. Only users with affected router models running firmware versions before v1.0.4.102 are impacted.

💻 Affected Systems

Products:
  • Netgear RAX35
  • Netgear RAX38
  • Netgear RAX40
Versions: All versions before v1.0.4.102
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects routers with web interface enabled (default configuration). Remote exploitation possible if web interface is exposed to network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to sensitive configuration files, credentials, or system files, potentially leading to complete router compromise, network infiltration, or credential theft.

🟠

Likely Case

Attackers access restricted web application files, configuration data, or system information that could facilitate further attacks or reconnaissance.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the router's web interface files only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted HTTP packets to the router's web interface. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.0.4.102 or later

Vendor Advisory: https://kb.netgear.com/000064405/Security-Advisory-for-Path-Traversal-on-Some-Routers-PSV-2021-0268

Restart Required: Yes

Instructions:

1. Log into router web interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates. 4. If v1.0.4.102 or later is available, install it. 5. Router will restart automatically.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router web interface

Log into router > Advanced > Administration > Remote Management > Disable

Restrict Web Interface Access

all

Limit web interface access to trusted IP addresses only

Log into router > Advanced > Security > Access Control > Configure allowed IPs

🧯 If You Can't Patch

  • Place router behind firewall with strict inbound rules blocking all unnecessary ports
  • Disable web interface entirely if not required for operations

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface: Advanced > Administration > Router Status > Firmware Version

Check Version:

curl -s http://routerlogin.net | grep -i firmware

Verify Fix Applied:

Verify firmware version is v1.0.4.102 or later in router web interface

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with ../ sequences in URL path
  • Access attempts to unusual file paths
  • Failed authentication attempts to restricted paths

Network Indicators:

  • HTTP requests containing path traversal sequences (../, ..\)
  • Unusual file access patterns from external IPs

SIEM Query:

source="router_logs" AND (url="*../*" OR url="*..\\*")

🔗 References

📤 Share & Export