|
|||
Rule General Information |
---|
Release Date: | 2020-04-20 | |
Rule Name: | Cambium cnPilot r200 r201 Command Execution as root Vulnerability (CVE-2017-5259) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, an undocumented, root-privilege administration web shell is available using the HTTP path https:// |
|
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Network Device | |
Reference: | https://blog.rapid7.com/2017/12/19/r7-2017-25-cambium-epmp-and-cnpilot-multiple-vulnerabilities/ |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://www.cambiumnetworks.com/ |