CVE-2021-45660

7.1 HIGH

📋 TL;DR

This CVE describes a server-side injection vulnerability in certain NETGEAR Orbi WiFi systems. It allows attackers to inject malicious code that could compromise the device's web interface or underlying system. Affected users include those running specific NETGEAR Orbi models with firmware versions below the patched releases.

💻 Affected Systems

Products:
  • NETGEAR RBK40
  • NETGEAR RBR40
  • NETGEAR RBS40
  • NETGEAR RBK20
  • NETGEAR RBR20
  • NETGEAR RBS20
  • NETGEAR RBK50
  • NETGEAR RBR50
  • NETGEAR RBS50
  • NETGEAR RBS50Y
Versions: RBK40/RBR40/RBS40/RBK20/RBR20/RBS20/RBK50/RBR50/RBS50 before 2.5.1.16; RBS50Y before 2.6.1.40
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web administration interface of these Orbi WiFi systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network infiltration, and potential lateral movement to connected devices.

🟠

Likely Case

Unauthorized access to device configuration, network traffic interception, or denial of service affecting WiFi connectivity.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted web interface access and strong network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Server-side injection typically requires crafting specific malicious inputs but doesn't require authentication based on CWE-74 classification.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: RBK40/RBR40/RBS40/RBK20/RBR20/RBS20/RBK50/RBR50/RBS50: 2.5.1.16 or later; RBS50Y: 2.6.1.40 or later

Vendor Advisory: https://kb.netgear.com/000064064/Security-Advisory-for-Server-Side-Injection-on-Some-WiFi-Systems-PSV-2019-0133

Restart Required: Yes

Instructions:

1. Log into Orbi web interface. 2. Navigate to Advanced > Administration > Firmware Update. 3. Check for updates and install latest firmware. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to web administration interface

Network Segmentation

all

Place Orbi devices on isolated network segment with restricted access

🧯 If You Can't Patch

  • Disable web administration interface entirely if not needed
  • Implement strict firewall rules to block all inbound traffic to Orbi management ports

🔍 How to Verify

Check if Vulnerable:

Check firmware version in Orbi web interface under Advanced > Administration > Firmware Update

Check Version:

No CLI command; check via web interface or mobile app

Verify Fix Applied:

Confirm firmware version is 2.5.1.16 or later (2.6.1.40 or later for RBS50Y)

📡 Detection & Monitoring

Log Indicators:

  • Unusual web interface access patterns
  • Malformed HTTP requests to administration endpoints
  • Unexpected configuration changes

Network Indicators:

  • Suspicious traffic to Orbi management ports (typically 80/443)
  • Unusual outbound connections from Orbi device

SIEM Query:

source="netgear-orbi" AND (url="*admin*" OR url="*cgi*" OR url="*config*") AND (status=200 OR status=500) AND user_agent!="Mozilla*"

🔗 References

📤 Share & Export