CVE-2025-4135

6.3 MEDIUM

📋 TL;DR

This CVE describes a critical command injection vulnerability in Netgear WG302v2 wireless access points. Attackers can remotely execute arbitrary commands by manipulating the 'host' parameter in the ui_get_input_value function. All users running affected firmware versions are at risk.

💻 Affected Systems

Products:
  • Netgear WG302v2
Versions: Up to and including 5.2.9
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations running vulnerable firmware are affected. The vulnerability exists in the basic settings handler for static IP updates.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent backdoors, pivot to internal networks, steal credentials, or use the device as part of a botnet.

🟠

Likely Case

Remote code execution leading to device takeover, network reconnaissance, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if device is isolated in a DMZ with strict network segmentation and egress filtering.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects network infrastructure devices that are often internet-facing.
🏢 Internal Only: MEDIUM - While still serious, internal-only exposure reduces attack surface from external threats.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists on GitHub. The vulnerability is straightforward to exploit with publicly available details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.netgear.com/

Restart Required: Yes

Instructions:

1. Check Netgear's official website for firmware updates. 2. If available, download the latest firmware. 3. Log into the device web interface. 4. Navigate to Administration > Firmware Upgrade. 5. Upload and apply the new firmware. 6. Reboot the device.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the WG302v2 from untrusted networks and restrict access to management interfaces.

Access Control Lists

all

Implement firewall rules to restrict management interface access to trusted IP addresses only.

🧯 If You Can't Patch

  • Replace the vulnerable device with a supported model
  • Implement strict network segmentation and monitor all traffic to/from the device

🔍 How to Verify

Check if Vulnerable:

Check the firmware version via the web interface at System > Status > Firmware Version. If version is 5.2.9 or lower, the device is vulnerable.

Check Version:

No CLI command available. Use web interface: System > Status > Firmware Version

Verify Fix Applied:

After updating, verify the firmware version is above 5.2.9. Test the static IP update functionality to ensure command injection is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed login attempts followed by configuration changes
  • Unexpected processes running on the device

Network Indicators:

  • Unusual outbound connections from the access point
  • Traffic to known malicious IPs
  • Unexpected SSH/Telnet connections

SIEM Query:

source="netgear_wg302v2" AND (event_type="config_change" OR event_type="command_execution")

🔗 References

📤 Share & Export