First published: Sun Dec 26 2021(Updated: )
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, MR60 before 1.0.6.110, RAX20 before 1.0.2.82, RAX45 before 1.0.2.28, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX50 before 1.0.2.28, and RAX75 before 1.0.3.106.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear R7900p Firmware | <1.4.2.84 | |
Netgear R7900p | ||
Netgear R7960p Firmware | <1.4.2.84 | |
Netgear R7960p | ||
Netgear R8000 Firmware | <1.0.4.74 | |
NETGEAR R8000 | ||
Netgear R8000p Firmware | <1.4.2.84 | |
Netgear R8000p | ||
Netgear Mr60 Firmware | <1.0.6.110 | |
Netgear Mr60 | ||
Netgear Rax20 Firmware | <1.0.2.82 | |
Netgear Rax20 | ||
Netgear Rax45 Firmware | <1.0.2.28 | |
Netgear Rax45 | ||
Netgear Rax80 Firmware | <1.0.3.106 | |
Netgear Rax80 | ||
Netgear Rax15 Firmware | <1.0.2.82 | |
Netgear Rax15 | ||
Netgear Rax50 Firmware | <1.0.2.28 | |
Netgear Rax50 | ||
Netgear Rax75 Firmware | <1.0.3.106 | |
Netgear Rax75 | ||
Netgear Ms60 Firmware | <1.0.6.110 | |
Netgear Ms60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-45539 is high.
NETGEAR devices affected by CVE-2021-45539 include R7900P, R7960P, R8000, R8000P, MR60, RAX20, RAX45, RAX80, and MS60.
The recommended firmware versions to fix CVE-2021-45539 are R7900P 1.4.2.84, R7960P 1.4.2.84, R8000 1.0.4.74, R8000P 1.4.2.84, MR60 1.0.6.110, RAX20 1.0.2.82, RAX45 1.0.2.28, RAX80 1.0.3.106, and MS60 1.0.6.110.
An authenticated user can exploit CVE-2021-45539 through command injection.
More information about CVE-2021-45539 can be found at the following URL: [https://kb.netgear.com/000064476/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0195](https://kb.netgear.com/000064476/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0195)