First published: Sun Dec 26 2021(Updated: )
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear Rbk752 Firmware | <3.2.16.6 | |
Netgear Rbk752 | ||
Netgear Rbr750 Firmware | <3.2.16.6 | |
Netgear Rbr750 | ||
Netgear Rbs750 Firmware | <3.2.16.6 | |
Netgear Rbs750 | ||
Netgear Rbk852 Firmware | <3.2.16.6 | |
Netgear Rbk852 | ||
Netgear Rbr850 Firmware | <3.2.16.6 | |
NETGEAR RBR850 | ||
Netgear Rbs850 Firmware | <3.2.16.6 | |
Netgear Rbs850 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RBK752, RBR750, RBS750, RBK852, RBR850, and RBS850 devices are affected.
The severity of CVE-2021-45566 is high, with a severity value of 6.8.
An authenticated user can exploit CVE-2021-45566 through command injection.
The recommended firmware version to fix CVE-2021-45566 is 3.2.16.6.
You can find more information about CVE-2021-45566 in the Netgear security advisory: https://kb.netgear.com/000064087/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2020-0070