Qd840 Firmware

8 CVEs product

Monthly

CVE-2025-3461 CRITICAL POC Act Now

Quantenna Wi-Fi chipsets ship with an unauthenticated telnet interface enabled by default, allowing remote attackers to gain full administrative access without credentials. This affects Quantenna Wi-Fi chipset SDK through version 8.0.0.28, and while no official patch has been released at the time of CVE publication, the vendor has provided a best practices guide for implementors. The vulnerability enables both complete confidentiality and integrity compromise of affected devices.

Authentication Bypass Qv860 Firmware Qcs Ax3 T8 Firmware Qcs Ax3 T12 Firmware Qv840c Firmware +14
NVD
CVSS 3.1
9.1
EPSS
0.1%
CVE-2025-3460 HIGH POC This Week

Command injection vulnerability in Quantenna Wi-Fi chipset control scripts (specifically the set_tx_pow utility) that allows local, unauthenticated attackers to execute arbitrary commands with elevated privileges. The vulnerability affects Quantenna Wi-Fi chipset SDK through version 8.0.0.28 and remains unpatched at the time of disclosure, though the vendor has issued a best practices guide. An attacker with local access can leverage CWE-88 (argument injection) to compromise system integrity and confidentiality.

Command Injection Qcs Ax3 T8 Firmware Qv942c Firmware Qsr10gu Firmware Qv840 Firmware +14
NVD
CVSS 3.1
7.7
EPSS
0.3%
CVE-2025-3459 HIGH This Week

A command injection vulnerability (CVSS 7.7). High severity vulnerability requiring prompt remediation.

Command Injection RCE Qsr10gu Firmware Qcs Ax2 T8 Firmware Qcs Ax3 T8 Firmware +15
NVD
CVSS 3.1
7.7
EPSS
0.2%
CVE-2025-32459 HIGH This Week

A command injection vulnerability exists in the Quantenna Wi-Fi chipset's router_command.sh script, specifically in the sync_time argument handler, allowing unauthenticated local attackers to execute arbitrary commands with high impact on confidentiality and integrity. The vulnerability affects Quantenna Wi-Fi chipset SDK versions through 8.0.0.28 and remains unpatched as of the CVE publication date, though the vendor has released implementation best practices rather than a direct patch. The CVSS 7.7 score reflects the local attack vector but high-impact consequences; exploitation requires local access but no privileges or user interaction.

Command Injection Qcs Ax2 A12 Firmware Qv952c Firmware Qcs Ax3 T12 Firmware Qd840 Firmware +14
NVD
CVSS 3.1
7.7
EPSS
0.2%
CVE-2025-32458 HIGH This Week

Command injection vulnerability in Quantenna Wi-Fi chipset control scripts (router_command.sh) that allows local, unauthenticated attackers to execute arbitrary commands with high impact to confidentiality and integrity. The vulnerability affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the SDK and remains unpatched at disclosure, though the vendor has issued a best practices guide rather than a direct security patch. With a CVSS score of 7.7 and local attack vector requirements, this represents a significant risk to deployed routers and wireless access points using this chipset.

Command Injection Qhs710 Firmware Qcs Ax2 A12 Firmware Qv860 Firmware Qv952c Firmware +14
NVD
CVSS 3.1
7.7
EPSS
0.2%
CVE-2025-32457 HIGH This Week

A command injection vulnerability (CVSS 7.7). High severity vulnerability requiring prompt remediation.

Command Injection Qcs Ax3 A12 Firmware Qcs Ax2 T8 Firmware Qcs Ax3 S5 Firmware Qd840 Firmware +14
NVD
CVSS 3.1
7.7
EPSS
0.2%
CVE-2025-32456 HIGH This Week

A command injection vulnerability exists in the Quantenna Wi-Fi chipset's router_command.sh script affecting versions through 8.0.0.28 of the SDK. The flaw allows unauthenticated local attackers to inject arbitrary commands via improper argument handling in the put_file_to_qtn parameter, potentially leading to confidentiality and integrity compromise. No official patch is available as of the CVE publication date, though the vendor has released mitigation guidance; this vulnerability is not currently tracked as actively exploited in CISA's Known Exploited Vulnerabilities catalog.

Command Injection RCE Linux Qcs Ax2 A12 Firmware Qcs Ax3 T8 Firmware +16
NVD
CVSS 3.1
7.7
EPSS
0.2%
CVE-2025-32455 HIGH This Week

A command injection vulnerability exists in the Quantenna Wi-Fi chipset's router_command.sh local control script, allowing unauthenticated local attackers to execute arbitrary commands with high impact on confidentiality and integrity. The vulnerability affects Quantenna Wi-Fi chipset versions through 8.0.0.28 of the latest SDK and remains unpatched as of the CVE publication date, though the vendor has provided best practices guidance rather than a direct patch. With a CVSS score of 7.7 and local attack vector requirements, this poses significant risk to routers and access points using affected Quantenna chipsets, particularly in multi-user or compromised-local-network scenarios.

Command Injection RCE Qcs Ax3 A12 Firmware Qsr10ga Firmware Qd840 Firmware +15
NVD
CVSS 3.1
7.7
EPSS
0.2%
CVE-2025-3461
EPSS 0% CVSS 9.1
CRITICAL POC Act Now

Quantenna Wi-Fi chipsets ship with an unauthenticated telnet interface enabled by default, allowing remote attackers to gain full administrative access without credentials. This affects Quantenna Wi-Fi chipset SDK through version 8.0.0.28, and while no official patch has been released at the time of CVE publication, the vendor has provided a best practices guide for implementors. The vulnerability enables both complete confidentiality and integrity compromise of affected devices.

Authentication Bypass Qv860 Firmware Qcs Ax3 T8 Firmware +16
NVD
CVE-2025-3460
EPSS 0% CVSS 7.7
HIGH POC This Week

Command injection vulnerability in Quantenna Wi-Fi chipset control scripts (specifically the set_tx_pow utility) that allows local, unauthenticated attackers to execute arbitrary commands with elevated privileges. The vulnerability affects Quantenna Wi-Fi chipset SDK through version 8.0.0.28 and remains unpatched at the time of disclosure, though the vendor has issued a best practices guide. An attacker with local access can leverage CWE-88 (argument injection) to compromise system integrity and confidentiality.

Command Injection Qcs Ax3 T8 Firmware Qv942c Firmware +16
NVD
CVE-2025-3459
EPSS 0% CVSS 7.7
HIGH This Week

A command injection vulnerability (CVSS 7.7). High severity vulnerability requiring prompt remediation.

Command Injection RCE Qsr10gu Firmware +17
NVD
CVE-2025-32459
EPSS 0% CVSS 7.7
HIGH This Week

A command injection vulnerability exists in the Quantenna Wi-Fi chipset's router_command.sh script, specifically in the sync_time argument handler, allowing unauthenticated local attackers to execute arbitrary commands with high impact on confidentiality and integrity. The vulnerability affects Quantenna Wi-Fi chipset SDK versions through 8.0.0.28 and remains unpatched as of the CVE publication date, though the vendor has released implementation best practices rather than a direct patch. The CVSS 7.7 score reflects the local attack vector but high-impact consequences; exploitation requires local access but no privileges or user interaction.

Command Injection Qcs Ax2 A12 Firmware Qv952c Firmware +16
NVD
CVE-2025-32458
EPSS 0% CVSS 7.7
HIGH This Week

Command injection vulnerability in Quantenna Wi-Fi chipset control scripts (router_command.sh) that allows local, unauthenticated attackers to execute arbitrary commands with high impact to confidentiality and integrity. The vulnerability affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the SDK and remains unpatched at disclosure, though the vendor has issued a best practices guide rather than a direct security patch. With a CVSS score of 7.7 and local attack vector requirements, this represents a significant risk to deployed routers and wireless access points using this chipset.

Command Injection Qhs710 Firmware Qcs Ax2 A12 Firmware +16
NVD
CVE-2025-32457
EPSS 0% CVSS 7.7
HIGH This Week

A command injection vulnerability (CVSS 7.7). High severity vulnerability requiring prompt remediation.

Command Injection Qcs Ax3 A12 Firmware Qcs Ax2 T8 Firmware +16
NVD
CVE-2025-32456
EPSS 0% CVSS 7.7
HIGH This Week

A command injection vulnerability exists in the Quantenna Wi-Fi chipset's router_command.sh script affecting versions through 8.0.0.28 of the SDK. The flaw allows unauthenticated local attackers to inject arbitrary commands via improper argument handling in the put_file_to_qtn parameter, potentially leading to confidentiality and integrity compromise. No official patch is available as of the CVE publication date, though the vendor has released mitigation guidance; this vulnerability is not currently tracked as actively exploited in CISA's Known Exploited Vulnerabilities catalog.

Command Injection RCE Linux +18
NVD
CVE-2025-32455
EPSS 0% CVSS 7.7
HIGH This Week

A command injection vulnerability exists in the Quantenna Wi-Fi chipset's router_command.sh local control script, allowing unauthenticated local attackers to execute arbitrary commands with high impact on confidentiality and integrity. The vulnerability affects Quantenna Wi-Fi chipset versions through 8.0.0.28 of the latest SDK and remains unpatched as of the CVE publication date, though the vendor has provided best practices guidance rather than a direct patch. With a CVSS score of 7.7 and local attack vector requirements, this poses significant risk to routers and access points using affected Quantenna chipsets, particularly in multi-user or compromised-local-network scenarios.

Command Injection RCE Qcs Ax3 A12 Firmware +17
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy