We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32455

ON Semiconductor Quantenna router_command.sh (in the run_cmd argument) Argument Injection



Description

The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) . This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.

Reserved 2025-04-08 | Published 2025-06-08 | Updated 2025-06-08 | Assigner AHA


HIGH: 7.7CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

Product status

Default status
unaffected

Any version
affected

Credits

Ricky "HeadlessZeke" Lawshae of Keysight finder

todb coordinator

References

takeonme.org/cves/cve-2025-3460 third-party-advisory

community.onsemi.com/...-support-and-security-best-practices vendor-advisory

cve.org (CVE-2025-32455)

nvd.nist.gov (CVE-2025-32455)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32455

Support options

Helpdesk Chat, Email, Knowledgebase