On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4.0.1 for 802.11 ISP products, v5.3.5 for AirMax ISP products, and v5.4.5 for AirSync firmware. For example, Nanostation5 (Air OS) is affected.
References
Link | Resource |
---|---|
https://community.ubnt.com/t5/airMAX-General-Discussion/AirOS-Security-Exploit-Updated-Firmware/td-p/212974 | Issue Tracking Patch Vendor Advisory |
https://www.exploit-db.com/exploits/14146 | Third Party Advisory VDB Entry |
https://community.ubnt.com/t5/airMAX-General-Discussion/AirOS-Security-Exploit-Updated-Firmware/td-p/212974 | Issue Tracking Patch Vendor Advisory |
https://www.exploit-db.com/exploits/14146 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.ubnt.com/t5/airMAX-General-Discussion/AirOS-Security-Exploit-Updated-Firmware/td-p/212974 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/14146 - Third Party Advisory, VDB Entry |
Information
Published : 2019-06-11 21:29
Updated : 2024-11-21 01:23
NVD link : CVE-2010-5330
Mitre link : CVE-2010-5330
CVE.ORG link : CVE-2010-5330
JSON object : View
Products Affected
ui
- airos
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')