The web management interface of Ubiquiti airMAX, airFiber, airGateway and EdgeSwitch XP (formerly TOUGHSwitch) allows an unauthenticated attacker to upload and write arbitrary files using directory traversal techniques. An attacker can exploit this vulnerability to gain root privileges. This vulnerability is fixed in the following product versions (fixes released in July 2015, all prior versions are affected): airMAX AC 7.1.3; airMAX M (and airRouter) 5.6.2 XM/XW/TI, 5.5.11 XM/TI, and 5.5.10u2 XW; airGateway 1.1.5; airFiber AF24/AF24HD 2.2.1, AF5x 3.0.2.1, and AF5 2.2.1; airOS 4 XS2/XS5 4.0.4; and EdgeSwitch XP (formerly TOUGHSwitch) 1.3.2.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Ubnt
Subscribe
|
|
|
Ui
Subscribe
|
Af5
Subscribe
Af5 Firmware
Subscribe
Af5x
Subscribe
Af5x Firmware
Subscribe
Airfiber Af24
Subscribe
Airfiber Af24 Firmware
Subscribe
Airfiber Af24hd
Subscribe
Airfiber Af24hd Firmware
Subscribe
Airgateway
Subscribe
Airgateway Firmware
Subscribe
Airmax Ac
Subscribe
Airmax Ac Firmware
Subscribe
Airmax M
Subscribe
Airmax M Ti
Subscribe
Airmax M Ti Firmware
Subscribe
Airmax M Xm
Subscribe
Airmax M Xm Firmware
Subscribe
Airmax M Xw
Subscribe
Airmax M Xw Firmware
Subscribe
Edgeswitch Xp
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T08:43:42.375Z
Reserved: 2018-09-04T00:00:00
Link: CVE-2015-9266
No data.
Status : Modified
Published: 2018-09-05T20:29:00.253
Modified: 2024-11-21T02:40:12.417
Link: CVE-2015-9266
No data.
OpenCVE Enrichment
No data.
Weaknesses