CVE-2021-45632

9.6 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary commands on affected NETGEAR WiFi systems. It affects multiple NETGEAR router models running outdated firmware versions. Attackers can exploit this without any credentials.

💻 Affected Systems

Products:
  • NETGEAR CBR750
  • NETGEAR RBK752
  • NETGEAR RBR750
  • NETGEAR RBS750
  • NETGEAR RBK852
  • NETGEAR RBR850
  • NETGEAR RBS850
Versions: CBR750 before 4.6.3.6, all others before 3.2.17.12
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both standalone routers and mesh WiFi systems. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to connected devices, and potential data exfiltration.

🟠

Likely Case

Remote code execution allowing attackers to modify device settings, install malware, or use the device as part of a botnet.

🟢

If Mitigated

No impact if devices are patched or properly segmented from untrusted networks.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing devices extremely vulnerable.
🏢 Internal Only: MEDIUM - Still vulnerable to internal attackers or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Pre-authentication command injection with public technical details available. Simple exploitation makes weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CBR750: 4.6.3.6 or later; Others: 3.2.17.12 or later

Vendor Advisory: https://kb.netgear.com/000064137/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0505

Restart Required: Yes

Instructions:

1. Log into NETGEAR router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install latest firmware. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks and limit access to management interfaces.

Firewall Rules

all

Block external access to router management interfaces (typically ports 80, 443, 8080).

🧯 If You Can't Patch

  • Replace affected devices with patched or alternative models
  • Implement strict network segmentation and access controls

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under Advanced > Administration > Firmware Update

Check Version:

Check via web interface or SSH if enabled: cat /etc/version

Verify Fix Applied:

Confirm firmware version is CBR750: 4.6.3.6+ or others: 3.2.17.12+

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful access
  • Unexpected process creation

Network Indicators:

  • Unusual outbound connections from router
  • Traffic to known malicious IPs from router
  • Port scanning originating from router

SIEM Query:

source="router_logs" AND ("command injection" OR "unauthorized access" OR "shell execution")

🔗 References

📤 Share & Export