A critical remote code execution (RCE) vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters when debugging mode is enabled. An attacker with a valid session ID (sess_id) can send specially crafted POST requests to the /json endpoint, enabling arbitrary command execution on the underlying system. This vulnerability can lead to full system compromise, including unauthorized access, privilege escalation, and potentially full device takeover.
References
Configurations
No configuration.
History
14 Feb 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
13 Feb 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-13 23:15
Updated : 2025-02-14 16:15
NVD link : CVE-2025-22962
Mitre link : CVE-2025-22962
CVE.ORG link : CVE-2025-22962
JSON object : View
Products Affected
No product.
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')