First published: Mon Mar 31 2025(Updated: )
Netgear WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the SetDefaultConnectionService function due to an unconstrained use of sscanf. The vulnerability allows for control of the program counter and can be utilized to achieve arbitrary code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear WNR854T Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-54808 is classified as a critical vulnerability due to the potential for arbitrary code execution.
To fix CVE-2024-54808, update the Netgear WNR854T firmware to the latest version that addresses this vulnerability.
CVE-2024-54808 affects the Netgear WNR854T firmware version 1.5.2 in North America.
CVE-2024-54808 could be exploited to perform remote code execution due to stack-based buffer overflow.
There are no effective workarounds for CVE-2024-54808; the best protection is to apply the firmware update immediately.