On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4.0.1 for 802.11 ISP products, v5.3.5 for AirMax ISP products, and v5.4.5 for AirSync firmware. For example, Nanostation5 (Air OS) is affected.
References
Link | Resource |
---|---|
https://community.ubnt.com/t5/airMAX-General-Discussion/AirOS-Security-Exploit-Updated-Firmware/td-p/212974 | Issue Tracking Patch Vendor Advisory |
https://community.ubnt.com/t5/airMAX-General-Discussion/AirOS-Security-Exploit-Updated-Firmware/td-p/212974 | Issue Tracking Patch Vendor Advisory |
https://www.exploit-db.com/exploits/14146 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/14146 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
19 Dec 2024, 19:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.ubnt.com/t5/airMAX-General-Discussion/AirOS-Security-Exploit-Updated-Firmware/td-p/212974 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/14146 - Third Party Advisory, VDB Entry |
Information
Published : 2019-06-11 21:29
Updated : 2025-03-14 17:50
NVD link : CVE-2010-5330
Mitre link : CVE-2010-5330
JSON object : View
Products Affected
ui
- airos
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')