CVE-2024-57539
Published: 21 January 2025
Summary
CVE-2024-57539 is a high-severity Command Injection (CWE-77) vulnerability in Linksys E8450 Firmware. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 9.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates command injection by requiring validation of user inputs like the userEmail parameter to block arbitrary command execution.
Requires timely remediation of the specific firmware flaw enabling command injection in Linksys E8450 v1.2.00.360516.
Restricts unauthorized or malformed inputs to the userEmail parameter, preventing exploitation of the command injection vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The command injection vulnerability via the userEmail parameter in the Linksys E8450 router web interface enables exploitation of a public-facing application (T1190) to achieve remote code execution through Unix shell commands (T1059.004).
NVD Description
Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via userEmail.
Deeper analysisAI
CVE-2024-57539 is a command injection vulnerability (CWE-77) affecting the Linksys E8450 router on firmware version v1.2.00.360516. The issue arises via the userEmail parameter, enabling attackers to inject and execute arbitrary commands on the device.
With a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N), the vulnerability is exploitable over the network by unauthenticated attackers requiring low complexity and no user interaction. Exploitation allows limited confidentiality impact alongside high integrity impact, such as modifying system data or configurations through command execution, with no availability disruption.
Mitigation details are available in the referenced advisory at https://github.com/Wood1314/Linksys_E8450_vul/blob/main/3/3.md.
Details
- CWE(s)