CVE-2021-45547

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated users to execute arbitrary commands on affected NETGEAR routers and WiFi systems through command injection. It affects multiple NETGEAR router models running outdated firmware versions, potentially allowing attackers with valid credentials to gain full control of the device.

💻 Affected Systems

Products:
  • NETGEAR R7850
  • R7900P
  • R7960P
  • R8000
  • R8000P
  • RAX200
  • RAX75
  • RAX80
  • RBK752
  • RBK852
  • RBR750
  • RBR850
  • RBS750
  • RBS850
Versions: See specific version requirements in description
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to exploit, but default configurations may be vulnerable if default credentials are unchanged.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with valid credentials could gain complete control of the router, intercept all network traffic, deploy malware to connected devices, or use the router as a pivot point into the internal network.

🟠

Likely Case

An authenticated malicious insider or an attacker who has obtained valid credentials could execute arbitrary commands to modify router settings, steal credentials, or disrupt network services.

🟢

If Mitigated

With proper access controls, strong authentication, and network segmentation, the impact is limited to the router itself rather than the entire network.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid authentication credentials but command injection is typically straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See specific version requirements in description (e.g., R7850 1.0.5.74 or later)

Vendor Advisory: https://kb.netgear.com/000064525/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0567

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to firmware update section. 3. Check for and install latest firmware. 4. Reboot router after update completes.

🔧 Temporary Workarounds

Change default credentials

all

Change all default usernames and passwords to strong, unique credentials to prevent unauthorized authentication.

Restrict admin access

all

Limit admin interface access to specific IP addresses or disable remote administration if not needed.

🧯 If You Can't Patch

  • Implement network segmentation to isolate the router from critical systems
  • Enable logging and monitoring for suspicious authentication attempts and command execution

🔍 How to Verify

Check if Vulnerable:

Check router firmware version against affected versions listed in the advisory

Check Version:

Log into router admin interface and check firmware version in settings

Verify Fix Applied:

Verify firmware version has been updated to patched version listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Unexpected command execution in router logs
  • Configuration changes from unusual sources

Network Indicators:

  • Unusual outbound connections from router
  • Traffic redirection or DNS changes

SIEM Query:

source="router_logs" AND (event="authentication" AND result="success" FROM unusual_ip) OR (event="command_execution")

🔗 References

📤 Share & Export