CVE-2021-45619

9.6 CRITICAL

📋 TL;DR

This CVE allows unauthenticated remote attackers to execute arbitrary commands on affected NETGEAR devices via command injection. It impacts numerous routers, extenders, and WiFi systems from NETGEAR, potentially leading to full device compromise. The vulnerability is pre-authentication, meaning attackers do not need credentials to exploit it.

💻 Affected Systems

Products:
  • NETGEAR EX6200v2
  • EX6250
  • EX7700
  • EX8000
  • LBR1020
  • LBR20
  • R7800
  • R8900
  • R9000
  • RBS50Y
  • WNR2000v5
  • XR700
  • EX6150v2
  • EX7300
  • EX7320
  • RAX10
  • RAX120
  • RAX70
  • EX6100v2
  • EX6400
  • EX7300v2
  • R6700AX
  • RAX120v2
  • RAX78
  • EX6410
  • RBR10
  • RBR20
  • RBR350
  • RBR40
  • RBR50
  • EX6420
  • RBS10
  • RBS20
  • RBS350
  • RBS40
  • RBS50
  • EX6400v2
  • RBK12
  • RBK20
  • RBK352
  • RBK40
  • RBK50
Versions: Versions before those specified in the CVE description (e.g., EX6200v2 before 1.0.1.86).
Operating Systems: Embedded firmware on NETGEAR devices
Default Config Vulnerable: ⚠️ Yes
Notes: All affected devices in default configurations are vulnerable if unpatched; no special settings required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device takeover, enabling attackers to install malware, steal sensitive data, pivot to internal networks, or create persistent backdoors.

🟠

Likely Case

Attackers gain remote code execution to disrupt network services, modify device settings, or use the device for botnet activities.

🟢

If Mitigated

With proper patching and network segmentation, impact is limited to isolated device compromise without broader network access.

🌐 Internet-Facing: HIGH, as the vulnerability is remotely exploitable without authentication on internet-exposed devices.
🏢 Internal Only: MEDIUM, as internal attackers could exploit it locally, but requires network access to the device.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward due to pre-authentication command injection; public proof-of-concept code may exist, increasing weaponization risk.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions as listed in the CVE description (e.g., EX6200v2 1.0.1.86 or later).

Vendor Advisory: https://kb.netgear.com/000064492/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2020-0435

Restart Required: Yes

Instructions:

1. Identify your NETGEAR device model and current firmware version. 2. Visit the NETGEAR support website or use the device's web interface to check for updates. 3. Download and apply the firmware update to the version specified in the advisory. 4. Restart the device as prompted to complete the update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from the internet and untrusted networks to reduce remote attack surface.

Access Control Lists (ACLs)

all

Implement firewall rules to restrict inbound access to device management interfaces.

🧯 If You Can't Patch

  • Replace the device with a non-affected model or one that has been patched.
  • Disable remote management features and ensure the device is not exposed to the internet.

🔍 How to Verify

Check if Vulnerable:

Check the device's firmware version via its web interface or command line; compare against patched versions listed in the NETGEAR advisory.

Check Version:

Log into the device's web interface and navigate to the firmware or system information section; exact command varies by model.

Verify Fix Applied:

Confirm the firmware version has been updated to the patched version specified in the advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution logs, unexpected system reboots, or unauthorized configuration changes in device logs.

Network Indicators:

  • Suspicious inbound traffic to device management ports (e.g., HTTP/HTTPS on ports 80, 443) from untrusted sources.

SIEM Query:

Example: 'source="netgear_device" AND (event="command_injection" OR event="unauthorized_access")'

🔗 References

📤 Share & Export