Vulnerability Description
In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netgear | Wnr854T Firmware | 1.5.2 |
| Netgear | Wnr854T | - |
Related Weaknesses (CWE)
References
- https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#807ExploitThird Party Advisory
FAQ
What is CVE-2024-54807?
CVE-2024-54807 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction ...
How severe is CVE-2024-54807?
CVE-2024-54807 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-54807?
Check the references section above for vendor advisories and patch information. Affected products include: Netgear Wnr854T Firmware, Netgear Wnr854T.