CVE-2021-45545

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated users to execute arbitrary commands on affected NETGEAR routers and WiFi systems through command injection. Attackers with valid credentials can gain elevated privileges and potentially take full control of the device. The vulnerability affects multiple NETGEAR router models with specific firmware versions.

💻 Affected Systems

Products:
  • NETGEAR R7850
  • NETGEAR R7900P
  • NETGEAR R7960P
  • NETGEAR R8000
  • NETGEAR R8000P
  • NETGEAR RAX200
  • NETGEAR RAX75
  • NETGEAR RAX80
  • NETGEAR RBK852
  • NETGEAR RBR850
  • NETGEAR RBS850
Versions: R7850 before 1.0.5.74, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication; default admin credentials increase risk. Affects both standalone routers and mesh WiFi systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing attackers to intercept all network traffic, install persistent malware, pivot to internal network devices, and use the router as a botnet node.

🟠

Likely Case

Unauthorized configuration changes, network traffic interception, credential theft from connected devices, and installation of backdoors.

🟢

If Mitigated

Limited to authenticated attackers only; proper network segmentation and monitoring could contain damage to the router itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but is straightforward once authenticated. Command injection vulnerabilities are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R7850: 1.0.5.74+, R7900P/R7960P/R8000P: 1.4.2.84+, R8000: 1.0.4.74+, RAX200/RAX75/RAX80: 1.0.4.120+, RBK852/RBR850/RBS850: 3.2.17.12+

Vendor Advisory: https://kb.netgear.com/000064522/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0557

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install latest firmware. 4. Reboot router after update completes.

🔧 Temporary Workarounds

Change Default Credentials

all

Change all default admin passwords to strong, unique passwords to reduce attack surface.

Disable Remote Management

all

Disable WAN-side administration to prevent external attackers from accessing admin interface.

🧯 If You Can't Patch

  • Segment affected routers from critical internal networks using VLANs or separate physical networks
  • Implement strict firewall rules limiting router management interface access to specific trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check current firmware version in router admin interface under Advanced > Administration > Firmware Update and compare with patched versions.

Check Version:

Log into router web interface and navigate to Advanced > Administration > Firmware Update to view current version

Verify Fix Applied:

Confirm firmware version matches or exceeds patched versions listed in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in router logs
  • Multiple failed login attempts followed by successful login
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains from router
  • Unexpected port scans originating from router

SIEM Query:

source="router_logs" AND (event_type="command_execution" OR event_type="config_change") AND user!="admin"

🔗 References

📤 Share & Export