Impact
The vulnerability allows a malicious actor within Wi‑Fi range of affected Ubiquiti devices to trigger remote code execution by sending specially crafted packets that exploit a flaw in the airMAX Wireless Protocol. The flaw can be abused to run arbitrary code on the device, potentially compromising confidentiality, integrity, and availability of the network. The issue is identified as CWE‑77 due to improper handling of command injection.
Affected Systems
Affected products include Ubiquiti airMAX AC, airMAX M, airFiber AF60‑XG, and airFiber AF60. Vulnerable firmware versions are airMAX AC 8.7.20 and earlier, airMAX M 6.3.22 and earlier, airFiber AF60‑XG 1.2.2 and earlier, and airFiber AF60 2.6.7 and earlier.
Risk and Exploitability
The CVSS score of 5.4 indicates a moderate severity; the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote over the air interface, requiring an adversary in physical wireless proximity to the device. No known public exploits have been reported, but the reachable nature of the flaw warrants precaution.
OpenCVE Enrichment