CVE-2021-45533

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated users to execute arbitrary commands on affected NETGEAR devices through command injection. It affects multiple NETGEAR WiFi extenders and Orbi systems running vulnerable firmware versions. Attackers with valid credentials can gain elevated privileges and potentially take full control of the device.

💻 Affected Systems

Products:
  • NETGEAR EX6120
  • NETGEAR EX6130
  • NETGEAR EX7000
  • NETGEAR EX7500
  • NETGEAR EX3700
  • NETGEAR EX3800
  • NETGEAR RBR850
  • NETGEAR RBS850
  • NETGEAR RBK852
Versions: EX6120 before 1.0.0.66, EX6130 before 1.0.0.46, EX7000 before 1.0.1.106, EX7500 before 1.0.1.76, EX3700 before 1.0.0.94, EX3800 before 1.0.0.94, RBR850 before 4.6.3.9, RBS850 before 4.6.3.9, RBK852 before 4.6.3.9
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the device's web interface or API.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network pivoting to internal systems, and potential data exfiltration.

🟠

Likely Case

Local attacker with valid credentials gains administrative access to modify device settings, intercept network traffic, or disrupt network services.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the affected device only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but is straightforward once authenticated. No public exploit code has been released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: EX6120: 1.0.0.66+, EX6130: 1.0.0.46+, EX7000: 1.0.1.106+, EX7500: 1.0.1.76+, EX3700: 1.0.0.94+, EX3800: 1.0.0.94+, RBR850: 4.6.3.9+, RBS850: 4.6.3.9+, RBK852: 4.6.3.9+

Vendor Advisory: https://kb.netgear.com/000064458/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Extenders-and-WiFi-Systems-PSV-2020-0062

Restart Required: Yes

Instructions:

1. Log into device web interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and apply latest firmware. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Restrict administrative access

all

Limit administrative access to trusted IP addresses only

Change default credentials

all

Ensure strong, unique passwords are used for all administrative accounts

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments with strict firewall rules
  • Implement network monitoring for suspicious command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device web interface under Advanced > Administration > Firmware Update

Check Version:

Check via web interface or use nmap -sV -p 80,443 [device_ip]

Verify Fix Applied:

Verify firmware version matches or exceeds patched versions listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from device
  • Suspicious HTTP POST requests to administrative endpoints

SIEM Query:

source="netgear_device" AND (event_type="command_execution" OR http_method="POST" AND uri="/cgi-bin/*")

🔗 References

📤 Share & Export