CVE-2021-45613

9.6 CRITICAL

📋 TL;DR

CVE-2021-45613 is a critical command injection vulnerability affecting multiple NETGEAR routers and WiFi systems. Unauthenticated attackers can execute arbitrary commands on affected devices, potentially gaining full control. This impacts numerous NETGEAR models running vulnerable firmware versions.

💻 Affected Systems

Products:
  • NETGEAR CBR40
  • CBR750
  • D7000v2
  • LAX20
  • MK62
  • MR60
  • MS60
  • MR80
  • MS80
  • RAX15
  • RAX20
  • RAX200
  • RAX45
  • RAX50
  • RAX43
  • RAX40v2
  • RAX35v2
  • RAX75
  • RAX80
  • RBK752
  • RBR750
  • RBS750
  • RBK852
  • RBR850
  • RBS850
  • XR1000
Versions: Versions before: CBR40 2.5.0.24, CBR750 4.6.3.6, D7000v2 1.0.0.74, LAX20 1.1.6.28, MK62/MR60/MS60 1.0.6.116, MR80/MS80 1.1.2.20, RAX15/20/45/50/43/40v2/35v2 1.0.3.96, RAX200/75/80 1.0.4.120, RBK752/RBR750/RBS750/RBK852/RBR850/RBS850 3.2.17.12, XR1000 1.0.0.58
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected devices in default configuration are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent malware, intercept all network traffic, pivot to internal networks, and use device as botnet node.

🟠

Likely Case

Attacker gains administrative access to router, changes DNS settings to redirect traffic, steals credentials, or installs cryptocurrency miners.

🟢

If Mitigated

With proper network segmentation and firewall rules, impact limited to isolated network segment containing vulnerable device.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, making them directly accessible to attackers without internal network access.
🏢 Internal Only: MEDIUM - If device is behind another firewall, risk reduced but still vulnerable to internal threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires no authentication and minimal technical skill. Public exploit code exists, making this easily weaponizable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: See affected_systems.versions for specific fixed versions per model

Vendor Advisory: https://kb.netgear.com/000064138/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0508

Restart Required: Yes

Instructions:

1. Log into NETGEAR router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install latest firmware. 4. Reboot router after update completes.

🔧 Temporary Workarounds

Disable remote management

all

Prevents external attackers from accessing vulnerable interface

Network segmentation

all

Place router in isolated network segment to limit lateral movement

🧯 If You Can't Patch

  • Replace vulnerable device with patched model or different vendor
  • Implement strict firewall rules to block all inbound traffic to router management interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface and compare with patched versions listed in advisory

Check Version:

Log into router admin interface and navigate to Advanced > Administration > Firmware Update to view current version

Verify Fix Applied:

Confirm firmware version matches or exceeds patched version for your specific model

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in router logs
  • Multiple failed login attempts followed by successful access
  • Unexpected firmware or configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Traffic redirection patterns

SIEM Query:

source="router_logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")

🔗 References

📤 Share & Export