First published: Mon Mar 31 2025(Updated: )
Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter pppoe_peer_mac and forcing a reboot. This will result in command injection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear WNR854T Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-54803 is classified as a critical vulnerability due to the potential for command injection and system compromise.
To fix CVE-2024-54803, update the Netgear WNR854T firmware to the latest version provided by Netgear.
CVE-2024-54803 affects users of Netgear WNR854T routers running firmware version 1.5.2 in North America.
Exploiting CVE-2024-54803 allows attackers to perform command injection attacks, potentially leading to unauthorized access and system control.
Currently, the best workaround for CVE-2024-54803 is to disable remote management features if they are not needed until a firmware update is available.