CVE-2021-45563

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated users to execute arbitrary commands on affected NETGEAR WiFi systems through command injection. It affects specific NETGEAR Orbi mesh WiFi systems running vulnerable firmware versions. Attackers with valid credentials can potentially gain full control of the device.

💻 Affected Systems

Products:
  • NETGEAR RBK752
  • NETGEAR RBR750
  • NETGEAR RBS750
  • NETGEAR RBK852
  • NETGEAR RBR850
  • NETGEAR RBS850
Versions: Firmware versions before 3.2.16.6
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to web interface or API. Affects both router and satellite units in Orbi mesh systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to other devices, and use as botnet node.

🟠

Likely Case

Authenticated attacker gains shell access to modify device configuration, install malware, or pivot to other network devices.

🟢

If Mitigated

With strong authentication controls and network segmentation, impact limited to isolated device compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but command injection is straightforward once authenticated. No public exploit code available but technique is well-known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.16.6 or later

Vendor Advisory: https://kb.netgear.com/000064084/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0066

Restart Required: Yes

Instructions:

1. Log into NETGEAR Orbi web interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install firmware version 3.2.16.6 or later. 4. Reboot all devices in the mesh system.

🔧 Temporary Workarounds

Restrict administrative access

all

Limit web interface access to trusted IP addresses only

Configure firewall rules to restrict access to router admin interface (default port 80/443)

Use strong authentication

all

Implement complex passwords and consider multi-factor authentication if supported

Change default admin password to complex unique password

🧯 If You Can't Patch

  • Segment affected devices on isolated VLAN to limit lateral movement
  • Implement strict network monitoring for unusual outbound connections from routers

🔍 How to Verify

Check if Vulnerable:

Check firmware version in Orbi web interface under Advanced > Administration > Firmware Update

Check Version:

curl -k https://routerlogin.net/currentsetting.htm | grep Firmware

Verify Fix Applied:

Confirm firmware version is 3.2.16.6 or higher in the same location

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected outbound connections from router to external IPs
  • Unusual DNS queries from router

SIEM Query:

source="router.log" AND ("command injection" OR "shell" OR "exec" OR suspicious command patterns)

🔗 References

📤 Share & Export