A vulnerability was found in Netgear WG302v2 up to 5.2.9 and classified as critical. Affected by this issue is the function ui_get_input_value. The manipulation of the argument host leads to command injection. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_WG302v2/Command_injection-basic_settings_handler-static-ip-update/README.md | Broken Link |
https://vuldb.com/?ctiid.306626 | Permissions Required VDB Entry |
https://vuldb.com/?id.306626 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.560779 | Third Party Advisory VDB Entry |
https://www.netgear.com/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
23 Jun 2025, 15:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:netgear:wg302v2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:netgear:wg302v2:-:*:*:*:*:*:*:* |
|
References | () https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_WG302v2/Command_injection-basic_settings_handler-static-ip-update/README.md - Broken Link | |
References | () https://vuldb.com/?ctiid.306626 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.306626 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.560779 - Third Party Advisory, VDB Entry | |
References | () https://www.netgear.com/ - Product | |
First Time |
Netgear
Netgear wg302v2 Firmware Netgear wg302v2 |
02 May 2025, 13:53
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Apr 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-30 18:15
Updated : 2025-06-23 15:13
NVD link : CVE-2025-4135
Mitre link : CVE-2025-4135
CVE.ORG link : CVE-2025-4135
JSON object : View
Products Affected
netgear
- wg302v2
- wg302v2_firmware