Логотип exploitDog
bind:CVE-2024-54807
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-54807

Количество 3

Количество 3

nvd логотип

CVE-2024-54807

10 месяцев назад

In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-8w2m-3cmp-47gw

10 месяцев назад

In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2025-03674

около 1 года назад

Уязвимость метода AddPortMapping микропрограммного обеспечения маршрутизаторов Netgear WNR854T, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-54807

In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution.

CVSS3: 9.8
5%
Низкий
10 месяцев назад
github логотип
GHSA-8w2m-3cmp-47gw

In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution.

CVSS3: 9.8
5%
Низкий
10 месяцев назад
fstec логотип
BDU:2025-03674

Уязвимость метода AddPortMapping микропрограммного обеспечения маршрутизаторов Netgear WNR854T, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
5%
Низкий
около 1 года назад

Уязвимостей на страницу