Metrics
Affected Vendors & Products
Tue, 26 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Engenius
Engenius enh1350ext Engenius ens500-ac Engenius ens620ext |
|
CPEs | cpe:2.3:a:engenius:enh1350ext:20241118:*:*:*:*:*:*:* cpe:2.3:a:engenius:ens500-ac:20241118:*:*:*:*:*:*:* cpe:2.3:a:engenius:ens620ext:20241118:*:*:*:*:*:*:* |
|
Vendors & Products |
Engenius
Engenius enh1350ext Engenius ens500-ac Engenius ens620ext |
|
Metrics |
ssvc
|
Mon, 25 Nov 2024 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/network/diag_traceroute. The manipulation of the argument diag_traceroute leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | EnGenius ENH1350EXT/ENS500-AC/ENS620EXT diag_traceroute command injection | |
Weaknesses | CWE-74 CWE-77 |
|
References |
| |
Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2024-11-25T03:31:30.271Z
Updated: 2024-11-26T15:51:27.284Z
Reserved: 2024-11-24T15:13:54.562Z
Link: CVE-2024-11653
Updated: 2024-11-26T15:51:21.228Z
Status : Received
Published: 2024-11-25T04:15:05.337
Modified: 2024-11-25T04:15:05.337
Link: CVE-2024-11653
No data.