First published: Wed Apr 30 2025(Updated: )
A vulnerability was found in Netgear WG302v2 up to 5.2.9 and classified as critical. Affected by this issue is the function ui_get_input_value. The manipulation of the argument host leads to command injection. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Netgear WG302v2 Firmware | <=5.2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4135 is classified as critical due to its potential for remote command injection.
To fix CVE-2025-4135, upgrade the Netgear WG302v2 firmware to a version beyond 5.2.9.
CVE-2025-4135 allows an attacker to execute arbitrary commands on the device due to an input validation flaw.
Yes, CVE-2025-4135 can be exploited remotely if the vulnerable version of firmware is used.
Netgear WG302v2 versions up to and including 5.2.9 are affected by CVE-2025-4135.