Cyber Posture

CVE-2024-54803

CriticalPublic PoC

Published: 31 March 2025

Published
31 March 2025
Modified
22 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1025 93.2th percentile
Risk Priority 26 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2024-54803 is a command injection vulnerability (CWE-94) in the Netgear WNR854T router version 1.5.2 for North America. The flaw occurs in the post.cgi script, where an attacker can send a specially crafted HTTP request to update the nvram parameter pppoe_peer_mac, triggering a forced reboot that results in command injection. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its high impact on confidentiality, integrity, and availability.

An unauthenticated attacker with network access to the router can exploit this vulnerability remotely with low complexity and no user interaction required. By crafting a malicious request to post.cgi, the attacker achieves arbitrary command injection during the reboot process, enabling potential full device compromise, execution of unauthorized commands, configuration manipulation, data exfiltration, or persistent denial of service.

Mitigation details are available in the referenced advisory at https://faultpoint.com/post/2025-03-25-8-cves-on-the-wnr854t-junkyard/#803, published prior to the CVE assignment on 2025-03-31. Security practitioners should consult this source for patching guidance or workarounds specific to the affected firmware.

Details

CWE(s)
CWE-94

Affected Products

netgear
wnr854t firmware
1.5.2

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The CVE describes remote unauthenticated command injection via a public-facing web script (post.cgi) on a router, directly enabling T1190 for initial access and T1059.004 for arbitrary Unix shell command execution on the device.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References