First published: Mon Mar 31 2025(Updated: )
In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear WNR854T Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-54807 is classified as a critical severity vulnerability due to the potential for command injection.
To fix CVE-2024-54807, update the Netgear WNR854T firmware to the latest version that addresses this vulnerability.
The impact of CVE-2024-54807 allows attackers to execute arbitrary commands on the device through a crafted SOAPAction request.
CVE-2024-54807 affects users of the Netgear WNR854T router running firmware version 1.5.2 in North America.
CVE-2024-54807 is a command injection vulnerability in the UPNP service, specifically in the addmap_exec function.