Description
Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands.
Published: 2025-03-31
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9057 Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands.
History

Thu, 17 Apr 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Netgear
Netgear wnr854t
Netgear wnr854t Firmware
CPEs cpe:2.3:h:netgear:wnr854t:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:wnr854t_firmware:1.5.2:*:*:*:*:*:*:*
Vendors & Products Netgear
Netgear wnr854t
Netgear wnr854t Firmware

Wed, 02 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 02 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 31 Mar 2025 21:00:00 +0000

Type Values Removed Values Added
Description Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffer overflow vulnerability in the parse_st_header function due to use of a request header parameter in a strncpy where size is determined based on the input specified. By sending a specially crafted packet, an attacker can take control of the program counter and hijack control flow of the program to execute arbitrary system commands.
References

Subscriptions

Netgear Wnr854t Wnr854t Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-04-02T13:55:32.964Z

Reserved: 2024-12-06T00:00:00.000Z

Link: CVE-2024-54809

cve-icon Vulnrichment

Updated: 2025-04-02T13:55:26.757Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-31T21:15:48.527

Modified: 2025-04-17T12:54:59.290

Link: CVE-2024-54809

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses