The following table lists the changes that have been made to the
CVE-2025-34068 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
CVE Modified
by [email protected]Jul. 15, 2025
Action Type Old Value New Value Added Reference https://www.vulncheck.com/advisories/samsung-wlan-ap-wea453e-unauthenticated-rce Removed Reference https://vulncheck/advisories/samsung-wlan-ap-wea453e-unauthenticated-rce -
New CVE Received
by [email protected]Jul. 15, 2025
Action Type Old Value New Value Added Description An unauthenticated remote command execution vulnerability exists in Samsung WLAN AP WEA453e firmware prior to version 5.2.4.T1 via improper input validation in the “Tech Support” diagnostic functionality. The command1 and command2 POST or GET parameters accept arbitrary shell commands that are executed with root privileges on the underlying operating system. An attacker can exploit this by crafting a request that injects shell commands to create output files in writable directories and then access their contents via the download endpoint. This flaw allows complete compromise of the device without authentication. Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Added CWE CWE-20 Added CWE CWE-78 Added CWE CWE-306 Added Reference https://fortiguard.fortinet.com/encyclopedia/ips/57323 Added Reference https://omriinbar.medium.com/samsung-wlan-ap-wea453e-vulnerabilities-7aa4a57d4dba Added Reference https://s4e.io/tools/samsung-wlan-ap-remote-code-execution Added Reference https://vulncheck/advisories/samsung-wlan-ap-wea453e-unauthenticated-rce Added Reference https://www.samsung.com/us/business/support/owners/product/400-series-wea453/