Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-489q-h7v6-2626

Опубликовано: 07 мая 2025
Источник: github
Github: Не прошло ревью
CVSS3: 10

Описание

A vulnerability in the Out-of-Band Access Point (AP) Image Download feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system.

This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.

Note: For exploitation to be successful, the Out-of-Band AP Image Download feature must be enabled on the device. It is not enabled by default.

A vulnerability in the Out-of-Band Access Point (AP) Image Download feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system.

This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.

Note: For exploitation to be successful, the Out-of-Band AP Image Download feature must be enabled on the device. It is not enabled by default.

EPSS

Процентиль: 84%
0.02185
Низкий

10 Critical

CVSS3

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 10
nvd
9 месяцев назад

A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.

CVSS3: 10
fstec
9 месяцев назад

Уязвимость функции загрузки образа точки доступа (AP) операционной системы Cisco IOS XE контроллеров беспроводной локальной сети (WLC), позволяющая нарушителю выполнять произвольные команды

EPSS

Процентиль: 84%
0.02185
Низкий

10 Critical

CVSS3

Дефекты

CWE-798