First published: Mon Mar 31 2025(Updated: )
Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter get_email. After which, they can visit the send_log.cgi endpoint which uses the parameter in a system call to achieve command execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear WNR854T Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-54805 is classified as a high-severity vulnerability due to its potential for command injection and remote code execution.
To fix CVE-2024-54805, update the Netgear WNR854T firmware to the latest version provided by Netgear.
The impact of CVE-2024-54805 includes unauthorized command execution on the affected Netgear device.
Users of the Netgear WNR854T router with firmware version 1.5.2 (North America) are affected by CVE-2024-54805.
CVE-2024-54805 involves the post.cgi and send_log.cgi components of the Netgear WNR854T router.