CVE-2024-54809

Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:wnr854t_firmware:1.5.2:*:*:*:*:*:*:*
cpe:2.3:h:netgear:wnr854t:-:*:*:*:*:*:*:*

History

17 Apr 2025, 12:54

Type Values Removed Values Added
CPE cpe:2.3:h:netgear:wnr854t:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:wnr854t_firmware:1.5.2:*:*:*:*:*:*:*
References () https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#809 - () https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#809 - Exploit, Third Party Advisory
First Time Netgear wnr854t
Netgear wnr854t Firmware
Netgear

02 Apr 2025, 14:15

Type Values Removed Values Added
CWE CWE-121
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
Summary
  • (es) Netgear Inc WNR854T 1.5.2 (Norteamérica) presenta una vulnerabilidad de desbordamiento de búfer en la función parse_st_header debido al uso de un parámetro de encabezado de solicitud en un strncpy donde el tamaño se determina en función de la entrada especificada. Al enviar un paquete especialmente manipulado, un atacante puede tomar el control del contador del programa y secuestrar el flujo de control del programa para ejecutar comandos arbitrarios del sistema.

31 Mar 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-31 21:15

Updated : 2025-04-17 12:54


NVD link : CVE-2024-54809

Mitre link : CVE-2024-54809

CVE.ORG link : CVE-2024-54809


JSON object : View

Products Affected

netgear

  • wnr854t_firmware
  • wnr854t
CWE
CWE-121

Stack-based Buffer Overflow