Netgear

Wnr854t Firmware

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.53%
  • Veröffentlicht 31.03.2025 21:15:48
  • Zuletzt bearbeitet 17.04.2025 13:00:32

In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 31.03.2025 21:15:48
  • Zuletzt bearbeitet 17.04.2025 12:55:22

Netgear WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the SetDefaultConnectionService function due to an unconstrained use of sscanf. The vulnerability allows for control of the program counter and can be utili...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 31.03.2025 21:15:48
  • Zuletzt bearbeitet 17.04.2025 12:54:59

Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a s...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 31.03.2025 21:15:47
  • Zuletzt bearbeitet 22.04.2025 18:17:11

In Netgear WNR854T 1.5.2 (North America), the UPNP service (/usr/sbin/upnp) is vulnerable to stack-based buffer overflow in the M-SEARCH Host header.

Exploit
  • EPSS 0.88%
  • Veröffentlicht 31.03.2025 21:15:47
  • Zuletzt bearbeitet 22.04.2025 18:16:52

Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter pppoe_peer_mac and forcing a reboot. This will result in command injection.

Exploit
  • EPSS 0.88%
  • Veröffentlicht 31.03.2025 21:15:47
  • Zuletzt bearbeitet 17.04.2025 13:05:10

Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter wan_hostname and forcing a reboot. This will result in command injection.

Exploit
  • EPSS 0.39%
  • Veröffentlicht 31.03.2025 21:15:47
  • Zuletzt bearbeitet 17.04.2025 13:04:30

Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can send a specially crafted request to post.cgi, updating the nvram parameter get_email. After which, they can visit the send_log.cgi endpoint which uses the param...

Exploit
  • EPSS 0.19%
  • Veröffentlicht 31.03.2025 21:15:47
  • Zuletzt bearbeitet 17.04.2025 13:03:58

Netgear WNR854T 1.5.2 (North America) is vulnerable to Arbitrary command execution in cmd.cgi which allows for the execution of system commands via the web interface.

  • EPSS 0.27%
  • Veröffentlicht 29.04.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 03:21:06

NETGEAR WNR854T devices before 1.5.2 are affected by command execution.