Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter get_email. After which, they can visit the send_log.cgi endpoint which uses the parameter in a system call to achieve command execution.
References
Link | Resource |
---|---|
https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#805 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
17 Apr 2025, 13:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netgear wnr854t
Netgear wnr854t Firmware Netgear |
|
CPE | cpe:2.3:h:netgear:wnr854t:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:wnr854t_firmware:1.5.2:*:*:*:*:*:*:* |
|
References | () https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#805 - Exploit, Third Party Advisory |
02 Apr 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-94 |
31 Mar 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-31 21:15
Updated : 2025-04-17 13:04
NVD link : CVE-2024-54805
Mitre link : CVE-2024-54805
CVE.ORG link : CVE-2024-54805
JSON object : View
Products Affected
netgear
- wnr854t_firmware
- wnr854t
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')