Netgear WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the SetDefaultConnectionService function due to an unconstrained use of sscanf. The vulnerability allows for control of the program counter and can be utilized to achieve arbitrary code execution.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#808 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
17 Apr 2025, 12:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:netgear:wnr854t:-:*:*:*:*:*:*:* cpe:2.3:o:netgear:wnr854t_firmware:1.5.2:*:*:*:*:*:*:* |
|
References | () https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#808 - Exploit, Third Party Advisory | |
First Time |
Netgear wnr854t
Netgear Netgear wnr854t Firmware |
31 Mar 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-31 21:15
Updated : 2025-04-17 12:55
NVD link : CVE-2024-54808
Mitre link : CVE-2024-54808
JSON object : View
Products Affected
netgear
- wnr854t
- wnr854t_firmware
CWE
No CWE.