Unauthenticated Remote Command Injection in Airspan AirSpot 5410 Version 0.3.4.1-4 and Below

Unauthenticated Remote Command Injection in Airspan AirSpot 5410 Version 0.3.4.1-4 and Below

CVE-2022-36267 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

In Airspan AirSpot 5410 version 0.3.4.1-4 and under there exists a Unauthenticated remote command injection vulnerability. The ping functionality can be called without user authentication when crafting a malicious http request by injecting code in one of the parameters allowing for remote code execution. This vulnerability is exploited via the binary file /home/www/cgi-bin/diagnostics.cgi that accepts unauthenticated requests and unsanitized data. As a result, a malicious actor can craft a specific request and interact remotely with the device.

Learn more about our User Device Pen Test.