Netgear WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the SetDefaultConnectionService function due to an unconstrained use of sscanf. The vulnerability allows for control of the program counter and can be utilized to achieve arbitrary code execution.
References
Link | Resource |
---|---|
https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#808 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
17 Apr 2025, 12:55
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netgear wnr854t
Netgear wnr854t Firmware Netgear |
|
References | () https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#808 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:h:netgear:wnr854t:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:wnr854t_firmware:1.5.2:*:*:*:*:*:*:* |
02 Apr 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
|
CWE | CWE-121 |
31 Mar 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-31 21:15
Updated : 2025-04-17 12:55
NVD link : CVE-2024-54808
Mitre link : CVE-2024-54808
CVE.ORG link : CVE-2024-54808
JSON object : View
Products Affected
netgear
- wnr854t_firmware
- wnr854t
CWE
CWE-121
Stack-based Buffer Overflow