CVE-2021-45595

7.6 HIGH

📋 TL;DR

This vulnerability allows authenticated users to execute arbitrary commands on affected NETGEAR WiFi systems through command injection. It affects multiple NETGEAR Orbi and Nighthawk mesh WiFi systems running outdated firmware versions. Attackers with valid credentials can potentially gain full control of the device.

💻 Affected Systems

Products:
  • NETGEAR LBR20
  • RBS50Y
  • RBR10
  • RBR20
  • RBR40
  • RBR50
  • RBS10
  • RBS20
  • RBS40
  • RBS50
  • RBK12
  • RBK20
  • RBK40
  • RBK50
Versions: LBR20 before 2.6.3.50; All other models before 2.7.3.22
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both router and satellite units in mesh systems. Requires authenticated access to the web interface or API.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full root access to the device, enabling them to install persistent malware, pivot to internal networks, intercept all network traffic, or use the device as part of a botnet.

🟠

Likely Case

An attacker with stolen or default credentials executes commands to modify device settings, create backdoors, or use the device for lateral movement within the network.

🟢

If Mitigated

With strong authentication and network segmentation, impact is limited to the compromised device only, preventing lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but is straightforward once authenticated. Public exploit code exists for similar NETGEAR vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: LBR20: 2.6.3.50 or later; All other models: 2.7.3.22 or later

Vendor Advisory: https://kb.netgear.com/000064495/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0462

Restart Required: Yes

Instructions:

1. Log into NETGEAR router web interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install latest firmware. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Change Default Credentials

all

Change all default admin passwords to strong, unique passwords to prevent unauthorized authentication.

Disable Remote Management

all

Disable remote administration features to prevent external access to the web interface.

🧯 If You Can't Patch

  • Segment affected devices on isolated VLANs to limit lateral movement
  • Implement strict network access controls and monitor for suspicious authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under Advanced > Administration > Firmware Update

Check Version:

curl -s http://routerlogin.com/currentsetting.htm | grep firmware

Verify Fix Applied:

Verify firmware version is LBR20: 2.6.3.50+ or other models: 2.7.3.22+

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login
  • Unusual command execution in system logs
  • Configuration changes from unexpected sources

Network Indicators:

  • Unusual outbound connections from router
  • Traffic to known malicious IPs from router
  • DNS queries to suspicious domains

SIEM Query:

source="router_logs" (event="authentication_success" AND user!="admin") OR (event="command_execution" AND process!="expected_process")

🔗 References

📤 Share & Export