Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 12 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arubanetworks
Arubanetworks arubaos |
|
| CPEs | cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Arubanetworks
Arubanetworks arubaos |
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hpe
Hpe arubaos |
|
| Vendors & Products |
Hpe
Hpe arubaos |
Tue, 14 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 | |
| Metrics |
ssvc
|
Tue, 14 Oct 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An arbitrary file write vulnerability exists in the web-based management interface of both the AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to upload arbitrary files and execute arbitrary commands on the underlying operating system. | |
| Title | Authenticated Remote Code Execution Vulnerability in AOS-10 GW and AOS-8 Controller/Mobility Conductor Web-Based Management Interface via Arbitrary File Write | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: hpe
Published:
Updated: 2026-02-26T17:47:31.640Z
Reserved: 2025-04-16T01:28:25.367Z
Link: CVE-2025-37132
Updated: 2025-10-14T19:16:56.076Z
Status : Analyzed
Published: 2025-10-14T17:15:39.737
Modified: 2025-11-12T16:35:17.570
Link: CVE-2025-37132
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:42:41Z