GHSA-93WV-9XC2-Q2RQ

Vulnerability from github – Published: 2025-07-15 15:30 – Updated: 2025-11-20 21:30
VLAI?
Details

An unauthenticated remote command execution vulnerability exists in Samsung WLAN AP WEA453e firmware prior to version 5.2.4.T1 via improper input validation in the “Tech Support” diagnostic functionality. The command1 and command2 POST or GET parameters accept arbitrary shell commands that are executed with root privileges on the underlying operating system. An attacker can exploit this by crafting a request that injects shell commands to create output files in writable directories and then access their contents via the download endpoint. This flaw allows complete compromise of the device without authentication.

Show details on source website

{
  "affected": [],
  "aliases": [
    "CVE-2025-34068"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-20",
      "CWE-306"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-07-15T13:15:29Z",
    "severity": "CRITICAL"
  },
  "details": "An unauthenticated remote command execution vulnerability exists in Samsung WLAN AP WEA453e firmware prior to version 5.2.4.T1 via improper input validation in the \u201cTech Support\u201d diagnostic functionality. The command1 and command2 POST or GET parameters accept arbitrary shell commands that are executed with root privileges on the underlying operating system. An attacker can exploit this by crafting a request that injects shell commands to create output files in writable directories\u00a0and then access their contents via the download endpoint. This flaw allows complete compromise of the device without authentication.",
  "id": "GHSA-93wv-9xc2-q2rq",
  "modified": "2025-11-20T21:30:30Z",
  "published": "2025-07-15T15:30:59Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-34068"
    },
    {
      "type": "WEB",
      "url": "https://fortiguard.fortinet.com/encyclopedia/ips/57323"
    },
    {
      "type": "WEB",
      "url": "https://omriinbar.medium.com/samsung-wlan-ap-wea453e-vulnerabilities-7aa4a57d4dba"
    },
    {
      "type": "WEB",
      "url": "https://s4e.io/tools/samsung-wlan-ap-remote-code-execution"
    },
    {
      "type": "WEB",
      "url": "https://www.samsung.com/us/business/support/owners/product/400-series-wea453"
    },
    {
      "type": "WEB",
      "url": "https://www.vulncheck.com/advisories/samsung-wlan-ap-wea453e-unauthenticated-rce"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
      "type": "CVSS_V4"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…