CVE-2025-52690
📋 TL;DR
This CVE describes a command injection vulnerability (CWE-77) in OmniAccess Stellar access points that allows authenticated attackers to execute arbitrary commands with root privileges. Successful exploitation could lead to complete system compromise. Affected systems include OmniAccess Stellar AP1101, AP1201, and AP1301 access points.
💻 Affected Systems
- Alcatel-Lucent Enterprise OmniAccess Stellar AP1101
- Alcatel-Lucent Enterprise OmniAccess Stellar AP1201
- Alcatel-Lucent Enterprise OmniAccess Stellar AP1301
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full root control of the access point, can intercept/modify all network traffic, pivot to internal networks, and maintain persistent access.
Likely Case
Attacker with network access exploits the vulnerability to gain root shell on the access point, enabling traffic interception and network disruption.
If Mitigated
With proper network segmentation and access controls, impact is limited to the compromised access point only.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once credentials are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 3.1.1
Vendor Advisory: https://www.al-enterprise.com/-/media/assets/internet/documents/sa-n0150-omniaccess-stellar-multiple-vulnerabilities.pdf
Restart Required: Yes
Instructions:
1. Download firmware version 3.1.1 from Alcatel-Lucent Enterprise support portal. 2. Backup current configuration. 3. Upload and apply the new firmware via web interface. 4. Reboot the access point.
🔧 Temporary Workarounds
Restrict Management Interface Access
allLimit access to the web management interface to trusted IP addresses only.
Configure firewall rules to restrict access to management IP/port (typically TCP 443)
Use Strong Authentication
allImplement complex passwords and consider multi-factor authentication if supported.
Change default credentials to strong, unique passwords
🧯 If You Can't Patch
- Isolate affected access points in separate VLAN with strict firewall rules
- Monitor for suspicious authentication attempts and command execution patterns
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface: System > About > Firmware Version
Check Version:
Check web interface or use SNMP query for sysDescr
Verify Fix Applied:
Verify firmware version shows 3.1.1 or later after update
📡 Detection & Monitoring
Log Indicators:
- Unusual authentication patterns
- Command execution in system logs
- Configuration changes from unexpected sources
Network Indicators:
- Unexpected outbound connections from access point
- Traffic interception patterns
- Port scanning originating from access point
SIEM Query:
source="access_point" AND (event_type="authentication" AND result="success" FROM new_ip) OR (process="bash" OR process="sh" AND parent_process="web_interface")