Impact
The vulnerability arises when Roxy‑WI, if LDAP authentication is activated, concatenates a user‑supplied login string directly into an LDAP search filter without escaping special characters. An unauthenticated attacker can inject LDAP meta‑characters into the username field, causing the search operation to return an unintended directory entry and thereby bypass authentication. As a result, the attacker gains authenticated access to the application’s interface, potentially with full administrative privileges. This flaw is classified as CWE‑287 and is reflected in a CVSS score of 7.7.
Affected Systems
The affected product is Roxy‑WI, managed by the roxy‑wi vendor. The issue is present in all versions up to and including 8.2.8.2. No official patch or workaround has been released by the vendor at the time of publication, and the vulnerability is not listed in the CISA KEV catalog.
Risk and Exploitability
With an unauthenticated attack vector and a high CVSS score of 7.7, the risk level is considered high. The absence of an EPSS score means exact exploitation probability is unknown, but the lack of a patch and the straightforward injection method suggest that skilled attackers could readily exploit the flaw. Since the vulnerability is not in the KEV, it has not yet been observed as a widely advertised exploit, yet the potential remains for active exploitation by risk‑tolerant adversaries. Protective action must be taken through disabling LDAP authentication, using a local code fix, or restricting network access to the Roxy‑WI instance.
OpenCVE Enrichment