A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. It has been classified as critical. Affected is an unknown function of the file /admin/network/wifi_schedule. The manipulation of the argument wifi_schedule_day_em_5 leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
History

Mon, 25 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Engeniustech
Engeniustech enh1350ext Firmware
Engeniustech ens500-ac Firmware
Engeniustech ens620ext Firmware
CPEs cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*
Vendors & Products Engeniustech
Engeniustech enh1350ext Firmware
Engeniustech ens500-ac Firmware
Engeniustech ens620ext Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 25 Nov 2024 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. It has been classified as critical. Affected is an unknown function of the file /admin/network/wifi_schedule. The manipulation of the argument wifi_schedule_day_em_5 leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title EnGenius ENH1350EXT/ENS500-AC/ENS620EXT wifi_schedule command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-11-25T02:31:24.797Z

Updated: 2024-11-25T20:14:34.678Z

Reserved: 2024-11-24T15:13:46.106Z

Link: CVE-2024-11651

cve-icon Vulnrichment

Updated: 2024-11-25T20:14:10.407Z

cve-icon NVD

Status : Received

Published: 2024-11-25T03:15:07.973

Modified: 2024-11-25T03:15:07.973

Link: CVE-2024-11651

cve-icon Redhat

No data.