CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Lifecycle Timeline
4Tags
Description
The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
Analysis
Command injection vulnerability in Quantenna Wi-Fi chipset control scripts (specifically the set_tx_pow utility) that allows local, unauthenticated attackers to execute arbitrary commands with elevated privileges. The vulnerability affects Quantenna Wi-Fi chipset SDK through version 8.0.0.28 and remains unpatched at the time of disclosure, though the vendor has issued a best practices guide. An attacker with local access can leverage CWE-88 (argument injection) to compromise system integrity and confidentiality.
Technical Context
The Quantenna Wi-Fi chipset SDK includes a local control script (set_tx_pow) responsible for transmit power configuration on Wi-Fi interfaces. This script fails to properly sanitize and neutralize command-line argument delimiters (CWE-88), allowing an attacker to inject shell metacharacters or additional commands into the argument processing logic. The vulnerability resides in the command construction phase where user-supplied input is concatenated directly into system calls without proper escaping, quoting, or parameterized command construction. This is a classic argument injection flaw distinct from simple command injection, where delimiters themselves become the attack vector rather than shell command separators. Affected products include devices implementing Quantenna Wi-Fi chipsets (CPE pattern: qualcomm-quantenna products) across multiple OEM implementations (routers, access points, embedded systems). The root cause is improper input validation in a privileged local utility.
Affected Products
Quantenna Wi-Fi Chipset SDK (Through version 8.0.0.28)
Remediation
Best practices mitigation: Apply Quantenna vendor-issued best practices guide for safe implementation of set_tx_pow and similar control scripts Input validation workaround: For integrators: Rewrite set_tx_pow to use parameterized command execution (exec() with array arguments in interpreted languages, or execlp/execvp in C) instead of shell command construction Monitoring: Monitor for unexpected calls to set_tx_pow with unusual arguments (e.g., semicolons, pipes, backticks, $() syntax)
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17411