Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices, this leads to wfaTGSendPing remote code execution as root via traffic to TCP port 8000 or 8080 on a LAN interface. On other devices, this may be exploitable over a WAN interface.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wi-fi-test Suite
Wi-fi-test Suite wi-fi-test Suite |
|
Weaknesses | CWE-78 | |
CPEs | cpe:2.3:a:wi-fi-test_suite:wi-fi-test_suite:*:*:*:*:*:*:*:* | |
Vendors & Products |
Wi-fi-test Suite
Wi-fi-test Suite wi-fi-test Suite |
|
Metrics |
cvssV3_1
|
Mon, 11 Nov 2024 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices, this leads to wfaTGSendPing remote code execution as root via traffic to TCP port 8000 or 8080 on a LAN interface. On other devices, this may be exploitable over a WAN interface. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-11-11T00:00:00
Updated: 2024-11-12T17:16:19.610Z
Reserved: 2024-07-26T00:00:00
Link: CVE-2024-41992
Vulnrichment
Updated: 2024-11-11T01:30:11.202Z
NVD
Status : Awaiting Analysis
Published: 2024-11-11T01:15:04.813
Modified: 2024-11-12T18:35:14.290
Link: CVE-2024-41992
Redhat
No data.