CVE-2021-45593

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated users to execute arbitrary commands on affected NETGEAR WiFi systems through command injection. It affects multiple NETGEAR Orbi router and satellite models running vulnerable firmware versions. Attackers with valid credentials can potentially gain full control of the device.

💻 Affected Systems

Products:
  • NETGEAR RBR20
  • NETGEAR RBR40
  • NETGEAR RBR50
  • NETGEAR RBS20
  • NETGEAR RBS40
  • NETGEAR RBK20
  • NETGEAR RBK40
  • NETGEAR RBK50
Versions: RBR20/RBR40/RBS20/RBS40/RBK20/RBK40 before 2.7.3.22; RBR50/RBK50 before 2.7.2.102
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both router and satellite units in Orbi mesh systems. Authentication required but default admin credentials could be used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise leading to network pivoting, data interception, malware deployment, and persistent backdoor installation across the entire mesh network.

🟠

Likely Case

Local network compromise allowing attackers to intercept traffic, modify network settings, and potentially access connected devices.

🟢

If Mitigated

Limited impact if strong authentication controls and network segmentation are in place, restricting attacker movement.

🌐 Internet-Facing: MEDIUM - While authentication is required, exposed admin interfaces could be targeted if credentials are compromised.
🏢 Internal Only: HIGH - Authenticated users or compromised internal accounts can exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward once credentials are obtained. Public exploit code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: RBR20/RBR40/RBS20/RBS40/RBK20/RBK40: 2.7.3.22 or later; RBR50/RBK50: 2.7.2.102 or later

Vendor Advisory: https://kb.netgear.com/000064474/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0175

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and apply if available. 4. Alternatively, download firmware from NETGEAR support site and manually upload. 5. Reboot device after update.

🔧 Temporary Workarounds

Disable remote management

all

Prevents external access to admin interface

Change default credentials

all

Use strong, unique passwords for admin accounts

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices
  • Enable logging and monitor for suspicious command execution attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under Advanced > Administration > Firmware Update

Check Version:

No CLI command; check via web interface or mobile app

Verify Fix Applied:

Confirm firmware version is at or above patched versions: 2.7.3.22 for most models, 2.7.2.102 for RBR50/RBK50

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected outbound connections from router
  • Unusual traffic patterns from router management interface

SIEM Query:

source="router_logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")

🔗 References

📤 Share & Export