In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Apr 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Netgear
Netgear wnr854t Netgear wnr854t Firmware |
|
CPEs | cpe:2.3:h:netgear:wnr854t:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:wnr854t_firmware:1.5.2:*:*:*:*:*:*:* |
|
Vendors & Products |
Netgear
Netgear wnr854t Netgear wnr854t Firmware |
Wed, 02 Apr 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 02 Apr 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-94 | |
Metrics |
cvssV3_1
|
Mon, 31 Mar 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-02T14:04:38.356Z
Reserved: 2024-12-06T00:00:00.000Z
Link: CVE-2024-54807

Updated: 2025-04-02T14:04:22.910Z

Status : Analyzed
Published: 2025-03-31T21:15:48.090
Modified: 2025-04-17T13:00:32.320
Link: CVE-2024-54807

No data.