In Airspan AirSpot 5410 version 0.3.4.1-4 and under there exists a Unauthenticated remote command injection vulnerability. The ping functionality can be called without user authentication when crafting a malicious http request by injecting code in one of the parameters allowing for remote code execution. This vulnerability is exploited via the binary file /home/www/cgi-bin/diagnostics.cgi that accepts unauthenticated requests and unsanitized data. As a result, a malicious actor can craft a specific request and interact remotely with the device.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T10:00:04.316Z

Reserved: 2022-07-18T00:00:00

Link: CVE-2022-36267

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-08-08T15:15:09.083

Modified: 2024-11-21T07:12:41.500

Link: CVE-2022-36267

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.