CVE-2025-34068

An unauthenticated remote command execution vulnerability exists in Samsung WLAN AP WEA453e firmware prior to version 5.2.4.T1 via improper input validation in the “Tech Support” diagnostic functionality. The command1 and command2 POST or GET parameters accept arbitrary shell commands that are executed with root privileges on the underlying operating system. An attacker can exploit this by crafting a request that injects shell commands to create output files in writable directories and then access their contents via the download endpoint. This flaw allows complete compromise of the device without authentication.
CVSS

No CVSS.

Configurations

No configuration.

History

15 Jul 2025, 14:15

Type Values Removed Values Added
References
  • {'url': 'https://vulncheck/advisories/samsung-wlan-ap-wea453e-unauthenticated-rce', 'source': 'disclosure@vulncheck.com'}
  • () https://www.vulncheck.com/advisories/samsung-wlan-ap-wea453e-unauthenticated-rce -

15 Jul 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-15 13:15

Updated : 2025-07-15 20:07


NVD link : CVE-2025-34068

Mitre link : CVE-2025-34068

CVE.ORG link : CVE-2025-34068


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-306

Missing Authentication for Critical Function