🔐 CVE Alert

CVE-2025-34068

UNKNOWN 0.0

Samsung WLAN AP WEA453e < 5.2.4.T1 Unauthenticated RCE via command1 and command2 Parameters

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An unauthenticated remote command execution vulnerability exists in Samsung WLAN AP WEA453e firmware prior to version 5.2.4.T1 via improper input validation in the “Tech Support” diagnostic functionality. The command1 and command2 POST or GET parameters accept arbitrary shell commands that are executed with root privileges on the underlying operating system. An attacker can exploit this by crafting a request that injects shell commands to create output files in writable directories and then access their contents via the download endpoint. This flaw allows complete compromise of the device without authentication. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC.

CWE CWE-306
Vendor samsung electronics
Product wlan ap wea453e
Published Jul 15, 2025
Last Updated May 14, 2026
Stay Ahead of the Next One

Get instant alerts for samsung electronics wlan ap wea453e

Be the first to know when new unknown vulnerabilities affecting samsung electronics wlan ap wea453e are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Samsung Electronics / WLAN AP WEA453e
* < 5.2.4.T1

References

NVD ↗ CVE.org ↗ EPSS Data ↗
omriinbar.medium.com: https://omriinbar.medium.com/samsung-wlan-ap-wea453e-vulnerabilities-7aa4a57d4dba fortiguard.fortinet.com: https://fortiguard.fortinet.com/encyclopedia/ips/57323 samsung.com: https://www.samsung.com/us/business/support/owners/product/400-series-wea453/ s4e.io: https://s4e.io/tools/samsung-wlan-ap-remote-code-execution vulncheck.com: https://www.vulncheck.com/advisories/samsung-wlan-ap-wea453e-unauthenticated-rce

Credits

Omri Inbar