Vulnerability Description
In Airspan AirSpot 5410 version 0.3.4.1-4 and under there exists a Hidden system command web page. After performing a reverse engineering of the firmware, it was discovered that a hidden page not listed in the administration management interface allows a user to execute Linux commands on the device with root privileges. An authenticated malicious threat actor can use this page to fully compromise the device.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Airspan | Airspot 5410 Firmware | <= 0.3.4.1-4 |
| Airspan | Airspot 5410 | - |
References
- https://gist.github.com/Nwqda/e82b3155401b094372195fdaa9b54833ExploitMitigationThird Party Advisory
- https://wdi.rfwel.com/cdn/techdocs/AirSpot5410.pdfProductThird Party Advisory
- https://gist.github.com/Nwqda/e82b3155401b094372195fdaa9b54833ExploitMitigationThird Party Advisory
- https://wdi.rfwel.com/cdn/techdocs/AirSpot5410.pdfProductThird Party Advisory
FAQ
What is CVE-2022-36265?
CVE-2022-36265 is a vulnerability with a CVSS score of 7.2 (HIGH). In Airspan AirSpot 5410 version 0.3.4.1-4 and under there exists a Hidden system command web page. After performing a reverse engineering of the firmware, it was discovered that a hidden page not list...
How severe is CVE-2022-36265?
CVE-2022-36265 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-36265?
Check the references section above for vendor advisories and patch information. Affected products include: Airspan Airspot 5410 Firmware, Airspan Airspot 5410.