Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ubiquiti
Ubiquiti aircontrol |
|
| Vendors & Products |
Ubiquiti
Ubiquiti aircontrol |
Mon, 02 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AirControl 1.4.2 contains a pre-authentication remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through malicious Java expression injection. Attackers can exploit the /.seam endpoint by crafting a specially constructed URL with embedded Java expressions to run commands with the application's system privileges. | |
| Title | AirControl 1.4.2 - PreAuth Remote Code Execution | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-02T20:05:43.002Z
Reserved: 2026-01-28T18:18:30.525Z
Link: CVE-2020-37052
Updated: 2026-02-02T20:05:34.292Z
Status : Deferred
Published: 2026-01-30T23:16:11.130
Modified: 2026-04-15T00:35:42.020
Link: CVE-2020-37052
No data.
OpenCVE Enrichment
Updated: 2026-02-02T09:27:11Z