Description
Command injection vulnerabilities exist in the web-based management interface of AOS-8 and AOS-10 Operating Systems. Successful exploitation could allow an authenticated remote attacker to upload arbitrary files to the underlying operating system, potentially leading to remote code execution as a privileged user.
Published: 2026-05-12
Score: 7.2 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a command injection flaw in the web‑based management interface of the AOS‑8 and AOS‑10 operating systems. An attacker who has authenticated access to the interface can upload arbitrary files that are executed by the underlying operating system, allowing them to run code with privileged user rights.

Affected Systems

Hewlett Packard Enterprise’s Aruba Networking Wireless Operating System (AOS), specifically versions AOS‑8 and AOS‑10.

Risk and Exploitability

The CVSS score of 7.2 indicates a high severity. EPSS information is not available and the vulnerability is not listed in the CISA KEV catalog. The flaw requires the attacker to first authenticate to the web interface, a condition that typically limits exploitation to users with legitimate or stolen credentials. Once authenticated, the attacker can upload files that are executed with elevated privileges, making the impact severe if credentials are compromised or weakly protected. The lack of public exploit evidence means the likelihood of an active attack is uncertain, but the combination of privilege escalation and the ease of file upload makes it a priority for remediation.

Generated by OpenCVE AI on May 12, 2026 at 20:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑supplied patch or upgrade to the latest AOS releases that remove the command injection flaw
  • Limit access to AOS web‑management interface to trusted IP ranges or enforce VPN usage to reduce exposure
  • Enforce strong passwords and enable multi‑factor authentication for all accounts that can access the interface

Generated by OpenCVE AI on May 12, 2026 at 20:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-78

Tue, 12 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description Command injection vulnerabilities exist in the web-based management interface of AOS-8 and AOS-10 Operating Systems. Successful exploitation could allow an authenticated remote attacker to upload arbitrary files to the underlying operating system, potentially leading to remote code execution as a privileged user.
Title Authenticated Remote Code Execution via Arbitrary File Write in AOS-8 and AOS-10 Web-Based Management Interface
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: hpe

Published:

Updated: 2026-05-12T18:58:19.086Z

Reserved: 2026-05-07T21:29:03.734Z

Link: CVE-2026-44854

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T20:16:44.017

Modified: 2026-05-12T20:16:44.017

Link: CVE-2026-44854

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T20:45:23Z

Weaknesses