{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T08:28:44.456","vulnerabilities":[{"cve":{"id":"CVE-2025-34068","sourceIdentifier":"disclosure@vulncheck.com","published":"2025-07-15T13:15:29.267","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An unauthenticated remote command execution vulnerability exists in Samsung WLAN AP WEA453e firmware prior to version 5.2.4.T1 via improper input validation in the “Tech Support” diagnostic functionality. The command1 and command2 POST or GET parameters accept arbitrary shell commands that are executed with root privileges on the underlying operating system. An attacker can exploit this by crafting a request that injects shell commands to create output files in writable directories and then access their contents via the download endpoint. This flaw allows complete compromise of the device without authentication. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC."},{"lang":"es","value":"Existe una vulnerabilidad de ejecución remota de comandos no autenticados en el firmware del punto de acceso Samsung WLAN AP WEA453e anterior a la versión 5.2.4.T1 debido a una validación de entrada incorrecta en la función de diagnóstico \"Soporte técnico\". Los parámetros POST o GET command1 y command2 aceptan comandos de shell arbitrarios que se ejecutan con privilegios de root en el sistema operativo subyacente. Un atacante puede explotar esto creando una solicitud que inyecte comandos de shell para crear archivos de salida en directorios con permisos de escritura y luego acceder a su contenido a través del endpoint de descarga. Esta falla permite la vulneración completa del dispositivo sin autenticación."}],"metrics":{"cvssMetricV40":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"weaknesses":[{"source":"disclosure@vulncheck.com","type":"Secondary","description":[{"lang":"en","value":"CWE-306"}]}],"references":[{"url":"https://fortiguard.fortinet.com/encyclopedia/ips/57323","source":"disclosure@vulncheck.com"},{"url":"https://omriinbar.medium.com/samsung-wlan-ap-wea453e-vulnerabilities-7aa4a57d4dba","source":"disclosure@vulncheck.com"},{"url":"https://s4e.io/tools/samsung-wlan-ap-remote-code-execution","source":"disclosure@vulncheck.com"},{"url":"https://www.samsung.com/us/business/support/owners/product/400-series-wea453/","source":"disclosure@vulncheck.com"},{"url":"https://www.vulncheck.com/advisories/samsung-wlan-ap-wea453e-unauthenticated-rce","source":"disclosure@vulncheck.com"}]}}]}