CVE-2021-45589

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated users to execute arbitrary commands on affected NETGEAR WiFi systems. It affects RBK752, RBR750, RBS750, RBK852, RBR850, and RBS850 devices running firmware versions before 3.2.16.6. Attackers with valid credentials can inject malicious commands through vulnerable interfaces.

💻 Affected Systems

Products:
  • NETGEAR RBK752
  • NETGEAR RBR750
  • NETGEAR RBS750
  • NETGEAR RBK852
  • NETGEAR RBR850
  • NETGEAR RBS850
Versions: All firmware versions before 3.2.16.6
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both router and satellite units in these WiFi systems. Authentication required but default credentials may be in use.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to network takeover, data exfiltration, or use as pivot point for lateral movement.

🟠

Likely Case

Unauthorized command execution allowing configuration changes, network disruption, or credential harvesting.

🟢

If Mitigated

Limited impact if strong authentication controls and network segmentation are implemented.

🌐 Internet-Facing: HIGH if devices have web management interfaces exposed to the internet.
🏢 Internal Only: MEDIUM as it requires authenticated access but could be exploited by malicious insiders or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but command injection vulnerabilities are typically straightforward to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.16.6 or later

Vendor Advisory: https://kb.netgear.com/000064111/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0097

Restart Required: Yes

Instructions:

1. Log into router web interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates or manually upload firmware version 3.2.16.6 or later. 4. Apply update and allow device to restart.

🔧 Temporary Workarounds

Restrict Management Access

all

Limit web interface access to trusted IP addresses only

Configure firewall rules to restrict access to router management IP/ports

Change Default Credentials

all

Use strong, unique passwords for all administrative accounts

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments with strict firewall rules
  • Implement multi-factor authentication if supported, or use certificate-based authentication

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under Advanced > Administration > Firmware Update

Check Version:

Check web interface or use: curl -k https://[router-ip]/currentsetting.htm | grep firmware

Verify Fix Applied:

Confirm firmware version shows 3.2.16.6 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected outbound connections from router
  • Unusual traffic patterns from router management interface

SIEM Query:

source="router_logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")

🔗 References

📤 Share & Export