Metrics
Affected Vendors & Products
Mon, 25 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Engeniustech
Engeniustech enh1350ext Firmware Engeniustech ens500-ac Firmware Engeniustech ens620ext Firmware |
|
CPEs | cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Engeniustech
Engeniustech enh1350ext Firmware Engeniustech ens500-ac Firmware Engeniustech ens620ext Firmware |
|
Metrics |
ssvc
|
Mon, 25 Nov 2024 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/sn_package/sn_https. The manipulation of the argument https_enable leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | EnGenius ENH1350EXT/ENS500-AC/ENS620EXT sn_https command injection | |
Weaknesses | CWE-74 CWE-77 |
|
References |
| |
Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2024-11-25T03:00:34.348Z
Updated: 2024-11-25T20:13:27.837Z
Reserved: 2024-11-24T15:13:51.901Z
Link: CVE-2024-11652
Updated: 2024-11-25T20:11:41.603Z
Status : Received
Published: 2024-11-25T03:15:08.533
Modified: 2024-11-25T03:15:08.533
Link: CVE-2024-11652
No data.