CVE-2021-45581

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated users to execute arbitrary commands on affected NETGEAR WiFi systems. It affects RBK752, RBR750, RBS750, RBK852, RBR850, and RBS850 devices running firmware versions before 3.2.16.6. Attackers with valid credentials can inject malicious commands through vulnerable interfaces.

💻 Affected Systems

Products:
  • NETGEAR RBK752
  • NETGEAR RBR750
  • NETGEAR RBS750
  • NETGEAR RBK852
  • NETGEAR RBR850
  • NETGEAR RBS850
Versions: All versions before 3.2.16.6
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both router and satellite units in mesh WiFi systems. Requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to install persistent backdoors, steal sensitive data, pivot to other network devices, or use the device as part of a botnet.

🟠

Likely Case

Local network compromise where authenticated attackers gain elevated privileges, modify device configurations, or disrupt network services.

🟢

If Mitigated

Limited impact if strong authentication controls, network segmentation, and proper access controls are implemented.

🌐 Internet-Facing: MEDIUM - While exploitation requires authentication, many home/small business routers have web interfaces exposed to the internet.
🏢 Internal Only: HIGH - Authenticated users on the local network can exploit this to gain full control of affected devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but command injection vulnerabilities are typically easy to weaponize once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.16.6 or later

Vendor Advisory: https://kb.netgear.com/000064103/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0089

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install version 3.2.16.6 or later. 4. Reboot the device after update completes.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to trusted IP addresses only

In router admin: Advanced > Administration > Set Access Control > Allow only specific IPs

Change Default Credentials

all

Ensure strong, unique passwords are set for all administrative accounts

In router admin: Advanced > Administration > Set Password

🧯 If You Can't Patch

  • Segment affected devices on isolated VLANs to limit lateral movement
  • Implement strict access controls and monitor for suspicious authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface: Advanced > Administration > Firmware Update

Check Version:

Not applicable - check via web interface or mobile app

Verify Fix Applied:

Confirm firmware version is 3.2.16.6 or higher in the admin interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected outbound connections from router
  • Unusual traffic patterns from router management interface

SIEM Query:

source="router_logs" AND (command_injection_indicators OR suspicious_admin_activity)

🔗 References

📤 Share & Export