Metrics
Affected Vendors & Products
Mon, 25 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Engenius
Engenius enh1350ext Engenius ens500-ac Engenius ens620ext |
|
CPEs | cpe:2.3:a:engenius:enh1350ext:20241118:*:*:*:*:*:*:* cpe:2.3:a:engenius:ens500-ac:20241118:*:*:*:*:*:*:* cpe:2.3:a:engenius:ens620ext:20241118:*:*:*:*:*:*:* |
|
Vendors & Products |
Engenius
Engenius enh1350ext Engenius ens500-ac Engenius ens620ext |
|
Metrics |
ssvc
|
Mon, 25 Nov 2024 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/network/diag_iperf. The manipulation of the argument iperf leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | EnGenius ENH1350EXT/ENS500-AC/ENS620EXT diag_iperf command injection | |
Weaknesses | CWE-74 CWE-77 |
|
References |
| |
Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2024-11-25T06:31:24.416Z
Updated: 2024-11-25T21:02:10.204Z
Reserved: 2024-11-24T15:14:12.920Z
Link: CVE-2024-11659
Updated: 2024-11-25T21:02:04.476Z
Status : Received
Published: 2024-11-25T07:15:04.837
Modified: 2024-11-25T07:15:04.837
Link: CVE-2024-11659
No data.