CVE-2025-32456

| EUVD-2025-17407 HIGH
2025-06-08 [email protected]
7.7
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:17 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:17 euvd
EUVD-2025-17407
CVE Published
Jun 08, 2025 - 21:15 nvd
HIGH 7.7

Description

The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.

Analysis

A command injection vulnerability exists in the Quantenna Wi-Fi chipset's router_command.sh script affecting versions through 8.0.0.28 of the SDK. The flaw allows unauthenticated local attackers to inject arbitrary commands via improper argument handling in the put_file_to_qtn parameter, potentially leading to confidentiality and integrity compromise. No official patch is available as of the CVE publication date, though the vendor has released mitigation guidance; this vulnerability is not currently tracked as actively exploited in CISA's Known Exploited Vulnerabilities catalog.

Technical Context

This vulnerability is an instance of CWE-88 (Argument Injection), where shell metacharacters and command delimiters are not properly sanitized when passed to the router_command.sh script. The affected component is a local control/management script on Quantenna Wi-Fi chipsets (typically integrated into enterprise or ISP-grade router and access point equipment). The put_file_to_qtn argument handler fails to quote or escape user-supplied input before passing it to shell execution contexts, allowing attackers to break out of intended argument boundaries and inject arbitrary shell commands. This is a classic shell command construction vulnerability stemming from insufficient input validation in the argument parsing logic, enabling attackers to achieve command-level code execution with the privileges of the script's execution context (typically root or elevated chipset firmware privileges).

Affected Products

Quantenna Wi-Fi chipset SDK version 8.0.0.28 and earlier versions are affected. Specific products include enterprise/ISP router and wireless access point equipment integrating Quantenna chipsets—though exact CPE strings for end-product devices are not provided in the CVE record. Affected component: router_command.sh script with vulnerable put_file_to_qtn argument handler. Quantenna is primarily used in enterprise WiFi infrastructure (access points, routers, and mesh systems); affected versions are those shipping with SDK ≤8.0.0.28. Vendor advisories or patch status should be checked directly with Quantenna and device manufacturers using their chipsets.

Remediation

No official patch version is documented in the CVE record at publication time. Recommended remediation: (1) Contact your router/access point manufacturer to determine if an updated firmware incorporating a patched Quantenna SDK is available; (2) Review and implement Quantenna's published best practices guide for developers integrating this chipset, which likely includes argument validation and escaping recommendations; (3) Apply compensating controls: restrict local access to the device (disable SSH/telnet for untrusted users, enforce strong authentication); (4) Implement input validation on the router_command.sh script by sanitizing the put_file_to_qtn argument (proper shell escaping via functions like shquote or using safe argument passing mechanisms rather than eval/direct shell concatenation); (5) Monitor for vendor security advisories and newer SDK versions that address this issue; (6) For high-risk deployments, consider network segmentation to limit local attack surface. Contact Quantenna directly or check their security advisories for the timeline and availability of patched SDK versions.

Priority Score

39
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +38
POC: 0

Share

CVE-2025-32456 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy