An issue was discovered on Mimosa Client Radios before 2.2.3 and Mimosa Backhaul Radios before 2.2.3. By connecting to the Mosquitto broker on an access point and one of its clients, an attacker can gather enough information to craft a command that reboots the client remotely when sent to the client's Mosquitto broker, aka "unauthenticated remote command execution." This command can be re-sent endlessly to act as a DoS attack on the client.
References
Link | Resource |
---|---|
http://blog.iancaling.com/post/160596244178 | Third Party Advisory |
http://blog.iancaling.com/post/160596244178 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.iancaling.com/post/160596244178 - Third Party Advisory |
Information
Published : 2017-05-21 21:29
Updated : 2024-11-21 03:35
NVD link : CVE-2017-9131
Mitre link : CVE-2017-9131
CVE.ORG link : CVE-2017-9131
JSON object : View
Products Affected
mimosa
- client_radios
- backhaul_radios
CWE
CWE-20
Improper Input Validation