In Airspan AirSpot 5410 version 0.3.4.1-4 and under there exists a Hidden system command web page. After performing a reverse engineering of the firmware, it was discovered that a hidden page not listed in the administration management interface allows a user to execute Linux commands on the device with root privileges. An authenticated malicious threat actor can use this page to fully compromise the device.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-38983 In Airspan AirSpot 5410 version 0.3.4.1-4 and under there exists a Hidden system command web page. After performing a reverse engineering of the firmware, it was discovered that a hidden page not listed in the administration management interface allows a user to execute Linux commands on the device with root privileges. An authenticated malicious threat actor can use this page to fully compromise the device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T10:00:04.314Z

Reserved: 2022-07-18T00:00:00

Link: CVE-2022-36265

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-08-08T15:15:08.943

Modified: 2024-11-21T07:12:41.200

Link: CVE-2022-36265

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.