CVE-2025-52690

8.1 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability (CWE-77) in OmniAccess Stellar access points that allows authenticated attackers to execute arbitrary commands with root privileges. Successful exploitation could lead to complete system compromise. Affected systems include OmniAccess Stellar AP1101, AP1201, and AP1301 access points.

💻 Affected Systems

Products:
  • Alcatel-Lucent Enterprise OmniAccess Stellar AP1101
  • Alcatel-Lucent Enterprise OmniAccess Stellar AP1201
  • Alcatel-Lucent Enterprise OmniAccess Stellar AP1301
Versions: All versions prior to 3.1.1
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web management interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full root control of the access point, can intercept/modify all network traffic, pivot to internal networks, and maintain persistent access.

🟠

Likely Case

Attacker with network access exploits the vulnerability to gain root shell on the access point, enabling traffic interception and network disruption.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the compromised access point only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.1.1

Vendor Advisory: https://www.al-enterprise.com/-/media/assets/internet/documents/sa-n0150-omniaccess-stellar-multiple-vulnerabilities.pdf

Restart Required: Yes

Instructions:

1. Download firmware version 3.1.1 from Alcatel-Lucent Enterprise support portal. 2. Backup current configuration. 3. Upload and apply the new firmware via web interface. 4. Reboot the access point.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit access to the web management interface to trusted IP addresses only.

Configure firewall rules to restrict access to management IP/port (typically TCP 443)

Use Strong Authentication

all

Implement complex passwords and consider multi-factor authentication if supported.

Change default credentials to strong, unique passwords

🧯 If You Can't Patch

  • Isolate affected access points in separate VLAN with strict firewall rules
  • Monitor for suspicious authentication attempts and command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: System > About > Firmware Version

Check Version:

Check web interface or use SNMP query for sysDescr

Verify Fix Applied:

Verify firmware version shows 3.1.1 or later after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Command execution in system logs
  • Configuration changes from unexpected sources

Network Indicators:

  • Unexpected outbound connections from access point
  • Traffic interception patterns
  • Port scanning originating from access point

SIEM Query:

source="access_point" AND (event_type="authentication" AND result="success" FROM new_ip) OR (process="bash" OR process="sh" AND parent_process="web_interface")

🔗 References

📤 Share & Export