Vulnerability Description
In version 3.5 and prior of Cambium Networks ePMP firmware, a lack of input sanitation for certain parameters on the web management console allows any authenticated user (including the otherwise low-privilege readonly user) to inject shell meta-characters as part of a specially-crafted POST request to the get_chart function and run OS-level commands, effectively as root.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cambiumnetworks | Epmp 1000 Firmware | <= 3.5 |
| Cambiumnetworks | Epmp 1000 | - |
| Cambiumnetworks | Epmp 2000 Firmware | <= 3.5 |
| Cambiumnetworks | Epmp 2000 | - |
Related Weaknesses (CWE)
References
- https://blog.rapid7.com/2017/12/19/r7-2017-25-cambium-epmp-and-cnpilot-multiple-Third Party Advisory
- https://www.exploit-db.com/exploits/43413/Third Party AdvisoryVDB Entry
- https://blog.rapid7.com/2017/12/19/r7-2017-25-cambium-epmp-and-cnpilot-multiple-Third Party Advisory
- https://www.exploit-db.com/exploits/43413/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2017-5255?
CVE-2017-5255 is a vulnerability with a CVSS score of 8.8 (HIGH). In version 3.5 and prior of Cambium Networks ePMP firmware, a lack of input sanitation for certain parameters on the web management console allows any authenticated user (including the otherwise low-p...
How severe is CVE-2017-5255?
CVE-2017-5255 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5255?
Check the references section above for vendor advisories and patch information. Affected products include: Cambiumnetworks Epmp 1000 Firmware, Cambiumnetworks Epmp 1000, Cambiumnetworks Epmp 2000 Firmware, Cambiumnetworks Epmp 2000.