A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V2.85.44), SiPass integrated ACC-AP (All versions < V2.85.43). Affected devices improperly sanitize user input on the telnet command line interface.
This could allow an authenticated user to escalate privileges by injecting arbitrary commands that are executed with root privileges.
This could allow an authenticated user to escalate privileges by injecting arbitrary commands that are executed with root privileges.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-53196 | A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V2.85.44), SiPass integrated ACC-AP (All versions < V2.85.43). Affected devices improperly sanitize user input on the telnet command line interface. This could allow an authenticated user to escalate privileges by injecting arbitrary commands that are executed with root privileges. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 20 Mar 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-03-20T20:14:08.699Z
Reserved: 2022-05-30T10:21:52.587Z
Link: CVE-2022-31808

Updated: 2024-08-03T07:26:01.373Z

Status : Modified
Published: 2023-02-14T11:15:12.700
Modified: 2024-11-21T07:05:22.323
Link: CVE-2022-31808

No data.

No data.