In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution.
References
| Link | Resource |
|---|---|
| https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#807 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-03-31 21:15
Updated : 2025-04-17 13:00
NVD link : CVE-2024-54807
Mitre link : CVE-2024-54807
CVE.ORG link : CVE-2024-54807
JSON object : View
Products Affected
netgear
- wnr854t
- wnr854t_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
