Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x855-4m6r-jwmr

Опубликовано: 14 фев. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

A critical remote code execution (RCE) vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters when debugging mode is enabled. An attacker with a valid session ID (sess_id) can send specially crafted POST requests to the /json endpoint, enabling arbitrary command execution on the underlying system. This vulnerability can lead to full system compromise, including unauthorized access, privilege escalation, and potentially full device takeover.

A critical remote code execution (RCE) vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters when debugging mode is enabled. An attacker with a valid session ID (sess_id) can send specially crafted POST requests to the /json endpoint, enabling arbitrary command execution on the underlying system. This vulnerability can lead to full system compromise, including unauthorized access, privilege escalation, and potentially full device takeover.

EPSS

Процентиль: 69%
0.00605
Низкий

7.2 High

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 7.2
nvd
12 месяцев назад

A critical remote code execution (RCE) vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters when debugging mode is enabled. An attacker with a valid session ID (sess_id) can send specially crafted POST requests to the /json endpoint, enabling arbitrary command execution on the underlying system. This vulnerability can lead to full system compromise, including unauthorized access, privilege escalation, and potentially full device takeover.

EPSS

Процентиль: 69%
0.00605
Низкий

7.2 High

CVSS3

Дефекты

CWE-77