Логотип exploitDog
bind:CVE-2024-54007
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-54007

Количество 3

Количество 3

nvd логотип

CVE-2024-54007

около 1 года назад

Multiple command injection vulnerabilities exist in the web interface of the 501 Wireless Client Bridge which could lead to authenticated remote command execution. Successful exploitation of these vulnerabilities result in the ability of an attacker to execute arbitrary commands as a privileged user on the underlying operating system. Exploitation requires administrative authentication credentials on the host system.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-3695-47qv-rc3x

около 1 года назад

Multiple command injection vulnerabilities exist in the web interface of the 501 Wireless Client Bridge which could lead to authenticated remote command execution. Successful exploitation of these vulnerabilities result in the ability of an attacker to execute arbitrary commands as a privileged user on the underlying operating system. Exploitation requires administrative authentication credentials on the host system.

CVSS3: 7.2
EPSS: Низкий
fstec логотип

BDU:2025-00215

около 1 года назад

Уязвимость веб-интерфейса управления микропрограммного обеспечения беспроводного клиентского моста HPE Aruba Networking 501, позволяющая нарушителю выполнить произвольный код в базовой операционной системе устройства

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-54007

Multiple command injection vulnerabilities exist in the web interface of the 501 Wireless Client Bridge which could lead to authenticated remote command execution. Successful exploitation of these vulnerabilities result in the ability of an attacker to execute arbitrary commands as a privileged user on the underlying operating system. Exploitation requires administrative authentication credentials on the host system.

CVSS3: 7.2
1%
Низкий
около 1 года назад
github логотип
GHSA-3695-47qv-rc3x

Multiple command injection vulnerabilities exist in the web interface of the 501 Wireless Client Bridge which could lead to authenticated remote command execution. Successful exploitation of these vulnerabilities result in the ability of an attacker to execute arbitrary commands as a privileged user on the underlying operating system. Exploitation requires administrative authentication credentials on the host system.

CVSS3: 7.2
1%
Низкий
около 1 года назад
fstec логотип
BDU:2025-00215

Уязвимость веб-интерфейса управления микропрограммного обеспечения беспроводного клиентского моста HPE Aruba Networking 501, позволяющая нарушителю выполнить произвольный код в базовой операционной системе устройства

CVSS3: 7.2
1%
Низкий
около 1 года назад

Уязвимостей на страницу