No analysis available yet.
Vendor Solution
Users and administrators of affected products are advised to contact their Business Partner immediately to update to the latest version.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21578 | Successful exploitation of the vulnerability could allow an attacker to inject commands with root privileges on the access point, potentially leading to the loss of confidentiality, integrity, availability, and full control of the access point. |
Wed, 16 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Wed, 16 Jul 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Successful exploitation of the vulnerability could allow an attacker to inject commands with root privileges on the access point, potentially leading to the loss of confidentiality, integrity, availability, and full control of the access point. | |
| Title | Command Injection Vulnerability in the OmniAccess Stellar Web Management Interface | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CSA
Published:
Updated: 2025-07-16T14:41:04.579Z
Reserved: 2025-06-19T06:04:41.986Z
Link: CVE-2025-52688
Updated: 2025-07-16T14:37:11.820Z
Status : Awaiting Analysis
Published: 2025-07-16T07:15:23.007
Modified: 2025-07-16T15:15:31.340
Link: CVE-2025-52688
No data.
OpenCVE Enrichment
No data.
EUVD