In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, an undocumented, root-privilege administration web shell is available using the HTTP path https://<device-ip-or-hostname>/adm/syscmd.asp.
References
Link | Resource |
---|---|
https://blog.rapid7.com/2017/12/19/r7-2017-25-cambium-epmp-and-cnpilot-multiple-vulnerabilities/ | Third Party Advisory |
https://blog.rapid7.com/2017/12/19/r7-2017-25-cambium-epmp-and-cnpilot-multiple-vulnerabilities/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 03:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.rapid7.com/2017/12/19/r7-2017-25-cambium-epmp-and-cnpilot-multiple-vulnerabilities/ - Third Party Advisory |
Information
Published : 2017-12-20 22:29
Updated : 2024-11-21 03:27
NVD link : CVE-2017-5259
Mitre link : CVE-2017-5259
CVE.ORG link : CVE-2017-5259
JSON object : View
Products Affected
cambiumnetworks
- cnpilot_e410_firmware
- cnpilot_r190n_firmware
- cnpilot_r190v_firmware
- cnpilot_r190n
- cnpilot_e400
- cnpilot_e600_firmware
- cnpilot_e410
- cnpilot_e600
- cnpilot_r190v
- cnpilot_e400_firmware