Skip to main content

CVE-2025-3460: CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in ON Semiconductor Quantenna Wi-Fi chipset

High
VulnerabilityCVE-2025-3460cvecve-2025-3460cwe-88
Published: Sun Jun 08 2025 (06/08/2025, 21:02:24 UTC)
Source: CVE Database V5
Vendor/Project: ON Semiconductor
Product: Quantenna Wi-Fi chipset

Description

The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.

AI-Powered Analysis

AILast updated: 07/09/2025, 01:26:56 UTC

Technical Analysis

CVE-2025-3460 is a high-severity vulnerability (CVSS 7.7) affecting the ON Semiconductor Quantenna Wi-Fi chipset, specifically through version 8.0.0.28 of its SDK. The vulnerability arises from improper neutralization of argument delimiters in a local control script named set_tx_pow, which is used to set the transmission power of the Wi-Fi chipset. This flaw is categorized under CWE-88, indicating an 'Argument Injection' vulnerability where unsanitized input can be injected into command arguments. Because the set_tx_pow script runs locally and does not require user interaction or privileges (PR:N, UI:N), an attacker with local access to the device could exploit this vulnerability to execute arbitrary commands with the privileges of the script. The impact of this vulnerability is significant, as it allows for full compromise of confidentiality and integrity of the affected device's system, though it does not affect availability. The vulnerability is currently unpatched, with no official patch released at the time of disclosure, but the vendor has published best practice guidelines for implementors. Exploitation requires local access to the device, which limits the attack vector primarily to insiders or attackers who have already breached perimeter defenses. No known exploits in the wild have been reported yet. The vulnerability affects a widely used Wi-Fi chipset embedded in various networking devices, potentially impacting many IoT and enterprise-grade wireless access points and routers that use this chipset. Given the critical role of Wi-Fi infrastructure in modern networks, exploitation could lead to unauthorized data access, manipulation of network traffic, or pivoting to other internal systems.

Potential Impact

For European organizations, the impact of CVE-2025-3460 could be substantial, especially for those relying on networking equipment incorporating the Quantenna Wi-Fi chipset. Compromise of Wi-Fi infrastructure can lead to exposure of sensitive communications, unauthorized network access, and potential lateral movement within corporate networks. This is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government agencies. The vulnerability's requirement for local access means that attackers would need to have physical or network-level access to the device, which could be achieved through compromised internal networks or malicious insiders. Given the widespread deployment of Wi-Fi devices in offices, manufacturing plants, and public spaces, exploitation could disrupt business operations and lead to data breaches. Moreover, the lack of an available patch increases the window of exposure. European organizations must consider the risk of this vulnerability in their asset inventories and network segmentation strategies to prevent attackers from reaching vulnerable devices.

Mitigation Recommendations

To mitigate CVE-2025-3460, European organizations should take several specific steps beyond generic patching advice: 1) Conduct an immediate inventory of all networking devices to identify those using the Quantenna Wi-Fi chipset and verify the SDK version. 2) Apply network segmentation to isolate Wi-Fi infrastructure devices from general user networks, limiting local access to trusted administrators only. 3) Implement strict access controls and monitoring on devices with local management interfaces to detect and prevent unauthorized access attempts. 4) Follow the vendor's best practices guide for secure implementation of the chipset, which may include disabling or restricting the set_tx_pow script or replacing it with a hardened alternative. 5) Employ host-based intrusion detection systems (HIDS) on critical devices to detect suspicious command execution or script usage. 6) Where possible, restrict physical access to networking hardware to prevent local exploitation. 7) Engage with vendors and monitor for patch releases, planning rapid deployment once available. 8) Educate network administrators about the risks of local command injection vulnerabilities and the importance of secure configuration and monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AHA
Date Reserved
2025-04-08T23:41:08.314Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6845fd8f71f4d251b567faf7

Added to database: 6/8/2025, 9:15:59 PM

Last enriched: 7/9/2025, 1:26:56 AM

Last updated: 8/6/2025, 6:19:44 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats