CVE-2025-52688

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands with root privileges on affected Alcatel-Lucent OmniAccess Stellar access points. Attackers can gain full control of the device, compromising all data and functionality. Organizations using vulnerable versions of these access points are affected.

💻 Affected Systems

Products:
  • Alcatel-Lucent OmniAccess Stellar Access Points
Versions: All versions prior to 5.1.0
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface of the access points. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the access point with root-level command execution, allowing attackers to intercept all network traffic, modify configurations, install persistent backdoors, and pivot to other network segments.

🟠

Likely Case

Attackers exploit the vulnerability to gain administrative control of the access point, potentially disrupting network services, stealing sensitive data, and using the device as a foothold for further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the access point itself, though attackers could still disrupt wireless services and potentially pivot to connected devices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation details are publicly available in the referenced advisories. The vulnerability is in the command injection mechanism of the web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.1.0

Vendor Advisory: https://www.al-enterprise.com/-/media/assets/internet/documents/sa-n0150-omniaccess-stellar-multiple-vulnerabilities.pdf

Restart Required: Yes

Instructions:

1. Download firmware version 5.1.0 from the Alcatel-Lucent support portal. 2. Backup current configuration. 3. Upload and install the new firmware via the web interface. 4. Reboot the access point. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable Web Management Interface

linux

Temporarily disable the vulnerable web interface to prevent exploitation while planning the update.

ssh admin@ap-ip "configure terminal"
no web-management enable
write memory

Restrict Management Access

linux

Limit management interface access to trusted IP addresses only.

ssh admin@ap-ip "configure terminal"
access-list management permit 192.168.1.0 255.255.255.0
access-list management deny any
write memory

🧯 If You Can't Patch

  • Isolate affected access points in a dedicated VLAN with strict firewall rules preventing outbound connections.
  • Implement network monitoring and intrusion detection specifically for command injection attempts against the access point management interface.

🔍 How to Verify

Check if Vulnerable:

Check the firmware version via SSH: ssh admin@ap-ip "show version" and look for version number. If version is below 5.1.0, the device is vulnerable.

Check Version:

ssh admin@ap-ip "show version" | grep "Firmware Version"

Verify Fix Applied:

After updating, run: ssh admin@ap-ip "show version" and confirm version is 5.1.0 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Multiple failed login attempts followed by successful access
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from access point management IP
  • Traffic patterns indicating command injection attempts (semicolons, pipes, backticks in HTTP requests)

SIEM Query:

source="ap-logs" AND (http_uri="*;*" OR http_uri="*|*" OR http_uri="*`*")

🔗 References

📤 Share & Export