CVE-2021-45585

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary commands on affected NETGEAR WiFi systems. It affects RBK752, RBR750, RBS750, RBK852, RBR850, and RBS850 devices running firmware versions before 3.2.16.6. Attackers must have valid credentials to exploit this command injection flaw.

💻 Affected Systems

Products:
  • NETGEAR RBK752
  • NETGEAR RBR750
  • NETGEAR RBS750
  • NETGEAR RBK852
  • NETGEAR RBR850
  • NETGEAR RBS850
Versions: All firmware versions before 3.2.16.6
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both router and satellite units in these WiFi 6 mesh systems. Authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attackers to install persistent backdoors, intercept network traffic, pivot to other internal systems, or use the device as part of a botnet.

🟠

Likely Case

Unauthorized configuration changes, network disruption, credential theft, or installation of cryptocurrency miners on vulnerable devices.

🟢

If Mitigated

Limited impact if strong authentication controls prevent unauthorized access and network segmentation isolates the devices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but command injection vulnerabilities are typically easy to exploit once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.16.6 or later

Vendor Advisory: https://kb.netgear.com/000064107/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0093

Restart Required: Yes

Instructions:

1. Log into NETGEAR router web interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install firmware version 3.2.16.6 or later. 4. Reboot the device after installation completes.

🔧 Temporary Workarounds

Restrict administrative access

all

Limit administrative interface access to trusted IP addresses only

Use strong authentication

all

Implement complex passwords and consider multi-factor authentication if supported

🧯 If You Can't Patch

  • Segment affected devices on isolated network VLANs
  • Implement strict firewall rules limiting outbound connections from affected devices

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under Advanced > Administration > Firmware Update

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Confirm firmware version shows 3.2.16.6 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected outbound connections from router
  • Unusual traffic patterns to/from administrative interface

SIEM Query:

source="netgear-router" AND (event_type="command_execution" OR auth_success="true" AND suspicious_pattern=*)

🔗 References

📤 Share & Export