Cyber Posture

CVE-2024-57226

HighPublic PoC

Published: 10 January 2025

Published
10 January 2025
Modified
16 April 2025
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0063 70.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-57226 is a high-severity Command Injection (CWE-77) vulnerability in Linksys E7350 Firmware. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 29.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the lack of input sanitization for the iface parameter in vif_enable, preventing command injection by validating all user inputs.

prevent

Mitigates the specific command injection flaw in the Linksys E7350 vif_enable function through timely flaw remediation and patching.

prevent

Restricts the iface parameter inputs to authorized formats and values, reducing opportunities for command injection exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.008 Network Device CLI Execution
Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads.
Why these techniques?

Command injection via the 'iface' parameter in the 'vif_enable' function of the Linksys E7350 router's web interface enables exploitation of a public-facing application (T1190) for remote command execution equivalent to network device CLI abuse (T1059.008).

NVD Description

Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via the iface parameter in the vif_enable function.

Deeper analysisAI

CVE-2024-57226 is a command injection vulnerability (CWE-77) affecting the Linksys E7350 router in version 1.1.00.032. The issue resides in the vif_enable function, where the iface parameter fails to properly sanitize user input, enabling injection of arbitrary commands.

Exploitation requires an attacker to have adjacent network access (AV:A) and low privileges (PR:L), with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation yields high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), as scored 8.0 under CVSS 3.1, potentially allowing full system compromise through arbitrary command execution in the context of the vulnerable function.

References point to a GitHub repository at https://github.com/yanggao017/vuln/blob/main/Linksys/E7350/CI_2_vif_enable/README.md, which documents the vulnerability and likely includes proof-of-concept details. No official advisories or patches are detailed in the available information.

Details

CWE(s)

Affected Products

linksys
e7350 firmware
1.1.00.032

CVEs Like This One

CVE-2024-57223Same product: Linksys E7350
CVE-2024-57227Same product: Linksys E7350
CVE-2024-57228Same product: Linksys E7350
CVE-2024-57224Same product: Linksys E7350
CVE-2024-57225Same product: Linksys E7350
CVE-2024-57536Same vendor: Linksys
CVE-2025-29229Same vendor: Linksys
CVE-2025-29228Same vendor: Linksys
CVE-2024-57539Same vendor: Linksys
CVE-2025-29230Same vendor: Linksys

References