CVE-2024-57536
Published: 21 January 2025
Summary
CVE-2024-57536 is a high-severity Command Injection (CWE-77) vulnerability in Linksys E8450 Firmware. Its CVSS base score is 8.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 23.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly and comprehensively prevents command injection by requiring input validation and error handling at entry points like the wizard_status parameter.
Mandates timely remediation of the specific command injection flaw in Linksys E8450 firmware version v1.2.00.360516.
Reduces impact of successful command injection by enforcing least privilege on processes handling the wizard_status parameter.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection via wizard_status in the Linksys router's web interface enables exploitation of a public-facing application (T1190) and facilitates command execution on the network device CLI (T1059.008).
NVD Description
Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via wizard_status.
Deeper analysisAI
CVE-2024-57536 is a command injection vulnerability (CWE-77) affecting the Linksys E8450 router on firmware version v1.2.00.360516. The issue arises via the wizard_status parameter, allowing arbitrary command execution on the device.
The vulnerability carries a CVSS v3.1 base score of 8.0 (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). An attacker with adjacent network access (AV:A) and low privileges (PR:L) can exploit it with low complexity and no user interaction, resulting in high impacts to confidentiality, integrity, and availability in an unchanged scope.
References point to a GitHub repository (https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md) detailing the vulnerability, published on 2025-01-21. No specific mitigation or patch details are outlined in the available information.
Details
- CWE(s)