EnGenius ENH1350EXT A8J-ENH1350EXT devices through 3.9.3.2_c1.9.51 allow (blind) OS Command Injection via shell metacharacters to the Ping or Speed Test utility. During the time of initial setup, the device creates an open unsecured network whose admin panel is configured with the default credentials of admin/admin. An unauthorized attacker in proximity to the Wi-Fi network can exploit this window of time to execute arbitrary OS commands with root-level permissions.
History

Mon, 28 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Engeniustech
Engeniustech enh1350ext Firmware
Weaknesses CWE-78
CPEs cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*
Vendors & Products Engeniustech
Engeniustech enh1350ext Firmware
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 24 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
Description EnGenius ENH1350EXT A8J-ENH1350EXT devices through 3.9.3.2_c1.9.51 allow (blind) OS Command Injection via shell metacharacters to the Ping or Speed Test utility. During the time of initial setup, the device creates an open unsecured network whose admin panel is configured with the default credentials of admin/admin. An unauthorized attacker in proximity to the Wi-Fi network can exploit this window of time to execute arbitrary OS commands with root-level permissions.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-10-24T00:00:00

Updated: 2024-10-28T19:10:46.922Z

Reserved: 2024-08-25T00:00:00

Link: CVE-2024-45242

cve-icon Vulnrichment

Updated: 2024-10-28T19:10:40.502Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-24T20:15:04.243

Modified: 2024-10-28T19:35:26.440

Link: CVE-2024-45242

cve-icon Redhat

No data.