Command Injection Vulnerability in Netgear Router Software
CVE-2024-54803
9.8CRITICAL
Summary
The Netgear WNR854T router version 1.5.2 is susceptible to a command injection vulnerability due to improper validation of input in the post.cgi script. An attacker can exploit this flaw by sending specially crafted requests that manipulate the nvram parameter pppoe_peer_mac, leading to unauthorized execution of commands. This vulnerability could allow remote attackers to force a system reboot and potentially gain unauthorized access to sensitive network configurations.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved