Логотип exploitDog
bind:CVE-2024-47460
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-47460

Количество 3

Количество 3

nvd логотип

CVE-2024-47460

больше 1 года назад

Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9
EPSS: Низкий
github логотип

GHSA-62f5-j9hj-j5w2

больше 1 года назад

Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9
EPSS: Низкий
fstec логотип

BDU:2024-10882

больше 1 года назад

Уязвимость интерфейса командной строки (CLI) операционных систем Instant AOS-8 и AOS-10, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-47460

Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9
2%
Низкий
больше 1 года назад
github логотип
GHSA-62f5-j9hj-j5w2

Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9
2%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-10882

Уязвимость интерфейса командной строки (CLI) операционных систем Instant AOS-8 и AOS-10, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 9
2%
Низкий
больше 1 года назад

Уязвимостей на страницу