logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2022-36267

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2022-36267

Description:
In Airspan AirSpot 5410 version 0.3.4.1-4 and under there exists a Unauthenticated remote command injection vulnerability. The ping functionality can be called without user authentication when crafting a malicious http request by injecting code in one of the parameters allowing for remote code execution. This vulnerability is exploited via the binary file /home/www/cgi-bin/diagnostics.cgi that accepts unauthenticated requests and unsanitized data. As a result, a malicious actor can craft a specific request and interact remotely with the device.
Last updated date:
08/12/2022

Reports

alt

ACTIVELY EXPLOITED

Type:
exploitation
Confidence:
HIGH
Date of publishing:
02/15/2023
Reference url to background

https://unit42.paloaltonetworks.com/mirai-variant-v3g4/

Type:
exploit
Confidence:
HIGH
Date of publishing:
08/12/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
08/12/2022
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2023

Privacy Policy