CVE-2021-45549

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated users to execute arbitrary commands on affected NETGEAR routers, extenders, and WiFi systems. Attackers with valid credentials can inject malicious commands through vulnerable interfaces, potentially gaining full control of the device. The vulnerability affects numerous NETGEAR models with specific firmware versions.

💻 Affected Systems

Products:
  • NETGEAR LAX20
  • MK62
  • MR60
  • MS60
  • R6400v2
  • R6700v3
  • R6900P
  • R7000
  • R7000P
  • R7850
  • R7900
  • R7900P
  • R7960P
  • R8000
  • R8000P
  • RAX15
  • RAX20
  • RAX200
  • RAX35v2
  • RAX40v2
  • RAX43
  • RAX45
  • RAX50
  • RAX75
  • RAX80
  • RS400
  • XR1000
Versions: Versions before specified security patches (e.g., LAX20 before 1.1.6.28, R7000 before 1.0.11.116, etc.)
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access. All default configurations with vulnerable firmware versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attacker to intercept all network traffic, install persistent backdoors, pivot to internal networks, and use device as part of botnet.

🟠

Likely Case

Local network compromise where attacker gains control of router to intercept traffic, modify DNS settings, or disable security features.

🟢

If Mitigated

Limited impact if strong authentication controls prevent unauthorized access and network segmentation isolates the device.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices that can be targeted remotely if web interface is exposed.
🏢 Internal Only: HIGH - Even internal attackers with credentials can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but command injection vulnerabilities are typically easy to weaponize once authentication is bypassed or obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Varies by model (e.g., LAX20 1.1.6.28, R7000 1.0.11.116, RAX50 1.0.3.96)

Vendor Advisory: https://kb.netgear.com/000064513/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0517

Restart Required: Yes

Instructions:

1. Log into NETGEAR router web interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and apply latest firmware. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to router administration interface

Implement strong authentication

all

Use complex passwords and enable multi-factor authentication if available

🧯 If You Can't Patch

  • Segment network to isolate router management interface
  • Implement strict access controls limiting who can authenticate to router

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under Advanced > Administration > Firmware Update and compare with patched versions in advisory.

Check Version:

Login to router web interface and navigate to Advanced > Administration > Firmware Update to view current version.

Verify Fix Applied:

Confirm firmware version matches or exceeds patched version listed in NETGEAR security advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login
  • Unexpected process execution or configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • DNS configuration changes
  • Unexpected port openings on router

SIEM Query:

source="router_logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")

🔗 References

📤 Share & Export