CVE-2021-45650

9.1 CRITICAL

📋 TL;DR

This vulnerability in certain NETGEAR routers allows unauthorized disclosure of sensitive information. Attackers can potentially access confidential data stored on affected devices. Users with specific NETGEAR router models running outdated firmware are affected.

💻 Affected Systems

Products:
  • NETGEAR R7000
  • NETGEAR R7900
  • NETGEAR R8000
  • NETGEAR RS400
  • NETGEAR R6400v2
  • NETGEAR R7000P
  • NETGEAR R6700v3
  • NETGEAR R6900P
Versions: R7000 before 1.0.11.110, R7900 before 1.0.4.30, R8000 before 1.0.4.62, RS400 before 1.5.1.80, R6400v2 before 1.0.4.102, R7000P before 1.3.2.126, R6700v3 before 1.0.4.102, R6900P before 1.3.2.126
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific firmware versions only. Devices with default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router credentials, network configuration, and potentially connected device information leading to full network takeover.

🟠

Likely Case

Exposure of router admin credentials, Wi-Fi passwords, and network configuration details enabling unauthorized network access.

🟢

If Mitigated

Limited impact with proper network segmentation and external firewall protection, though sensitive router data remains exposed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Information disclosure vulnerabilities typically require minimal technical skill to exploit once the method is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R7000: 1.0.11.110+, R7900: 1.0.4.30+, R8000: 1.0.4.62+, RS400: 1.5.1.80+, R6400v2: 1.0.4.102+, R7000P: 1.3.2.126+, R6700v3: 1.0.4.102+, R6900P: 1.3.2.126+

Vendor Advisory: https://kb.netgear.com/000064459/Security-Advisory-for-Sensitive-Information-Disclosure-on-Some-Routers-PSV-2020-0117

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates. 4. Download and install latest firmware. 5. Reboot router after update completes.

🔧 Temporary Workarounds

Disable remote management

all

Prevents external exploitation by disabling remote administration features

Change default credentials

all

Mitigates impact if credentials are exposed

🧯 If You Can't Patch

  • Replace affected router with updated model
  • Implement network segmentation to isolate router from critical systems

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in admin interface under Advanced > Administration > Firmware Update

Check Version:

Router-specific: Check via web interface at 192.168.1.1 or routerlogin.net

Verify Fix Applied:

Confirm firmware version matches or exceeds patched versions listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to router admin pages
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • Unexpected external connections to router management interface
  • Traffic patterns indicating data exfiltration

SIEM Query:

source="router.log" AND (event="admin_access" OR event="configuration_change") AND user!="authorized_user"

🔗 References

📤 Share & Export