Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arubanetworks
Arubanetworks arubaos Arubanetworks sd-wan |
|
| CPEs | cpe:2.3:a:arubanetworks:sd-wan:*:*:*:*:*:*:*:* cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Arubanetworks
Arubanetworks arubaos Arubanetworks sd-wan |
Wed, 13 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hpe
Hpe arubaos |
|
| Vendors & Products |
Hpe
Hpe arubaos |
Tue, 12 May 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 |
Tue, 12 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Command injection vulnerabilities exist in the web-based management interface of AOS-8 and AOS-10 Operating Systems. Successful exploitation could allow an authenticated remote attacker to upload arbitrary files to the underlying operating system, potentially leading to remote code execution as a privileged user. | |
| Title | Authenticated Remote Code Execution via Arbitrary File Write in AOS-8 and AOS-10 Web-Based Management Interface | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: hpe
Published:
Updated: 2026-05-13T15:35:40.376Z
Reserved: 2026-05-07T21:29:03.734Z
Link: CVE-2026-44853
Updated: 2026-05-13T15:34:42.377Z
Status : Analyzed
Published: 2026-05-12T20:16:43.913
Modified: 2026-05-14T15:05:17.507
Link: CVE-2026-44853
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:36:50Z