Description
In version 3.5 and prior of Cambium Networks ePMP firmware, a lack of input sanitation for certain parameters on the web management console allows any authenticated user (including the otherwise low-privilege readonly user) to inject shell meta-characters as part of a specially-crafted POST request to the get_chart function and run OS-level commands, effectively as root.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2024-08-05T14:55:35.811Z
Reserved: 2017-01-09T00:00:00.000Z
Link: CVE-2017-5255
No data.
Status : Modified
Published: 2017-12-20T22:29:00.353
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-5255
No data.
OpenCVE Enrichment
No data.
Weaknesses