CVE-2021-45569

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary commands on affected NETGEAR WiFi systems. It affects RBK752, RBR750, RBS750, RBK852, RBR850, and RBS850 devices running firmware versions before 3.2.16.6. Attackers must have valid credentials to exploit this command injection flaw.

💻 Affected Systems

Products:
  • NETGEAR RBK752
  • NETGEAR RBR750
  • NETGEAR RBS750
  • NETGEAR RBK852
  • NETGEAR RBR850
  • NETGEAR RBS850
Versions: All versions before 3.2.16.6
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access; default admin credentials increase risk if unchanged.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to install persistent backdoors, steal credentials, pivot to internal networks, or use device as part of botnet.

🟠

Likely Case

Attacker with valid credentials gains shell access to execute commands, potentially modifying device configuration, intercepting traffic, or disabling security features.

🟢

If Mitigated

With proper access controls and network segmentation, impact limited to isolated device compromise without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials; command injection typically straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.16.6 or later

Vendor Advisory: https://kb.netgear.com/000064091/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0077

Restart Required: Yes

Instructions:

1. Log into NETGEAR router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install firmware version 3.2.16.6 or later. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Change default credentials

all

Change default admin passwords to strong, unique credentials to reduce attack surface.

Restrict admin access

all

Limit admin interface access to trusted IP addresses only using firewall rules.

🧯 If You Can't Patch

  • Isolate affected devices on separate VLAN with strict firewall rules
  • Implement network monitoring for suspicious command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under Advanced > Administration > Firmware Update

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Confirm firmware version shows 3.2.16.6 or later in admin interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from router
  • Traffic patterns suggesting command-and-control communication

SIEM Query:

source="netgear-router" AND (event_type="command_execution" OR event_type="shell_access")

🔗 References

📤 Share & Export