Логотип exploitDog
bind:CVE-2025-20188
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-20188

Количество 3

Количество 3

nvd логотип

CVE-2025-20188

9 месяцев назад

A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-489q-h7v6-2626

9 месяцев назад

A vulnerability in the Out-of-Band Access Point (AP) Image Download feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges. Note: For exploitation to be successful, the Out-of-Band AP Image Download feature must be enabled on the device. It is not enabled by default.

CVSS3: 10
EPSS: Низкий
fstec логотип

BDU:2025-05297

9 месяцев назад

Уязвимость функции загрузки образа точки доступа (AP) операционной системы Cisco IOS XE контроллеров беспроводной локальной сети (WLC), позволяющая нарушителю выполнять произвольные команды

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-20188

A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.

CVSS3: 10
2%
Низкий
9 месяцев назад
github логотип
GHSA-489q-h7v6-2626

A vulnerability in the Out-of-Band Access Point (AP) Image Download feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP image download interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges. Note: For exploitation to be successful, the Out-of-Band AP Image Download feature must be enabled on the device. It is not enabled by default.

CVSS3: 10
2%
Низкий
9 месяцев назад
fstec логотип
BDU:2025-05297

Уязвимость функции загрузки образа точки доступа (AP) операционной системы Cisco IOS XE контроллеров беспроводной локальной сети (WLC), позволяющая нарушителю выполнять произвольные команды

CVSS3: 10
2%
Низкий
9 месяцев назад

Уязвимостей на страницу