The Aerohive/Extreme Networks NetConfig web interface is vulnerable to LFI via old PHP version leading to root access on access point
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
![]() | CVE-2020-16152 | 14 Nov 202121:15 | โ | nvd |
![]() | CVE-2020-16152 | 14 Nov 202121:15 | โ | cve |
![]() | Aerohive Networks HiveOS Remote Code Execution (CVE-2020-16152) | 8 Dec 202100:00 | โ | checkpoint_advisories |
![]() | Code injection | 14 Nov 202121:15 | โ | prion |
![]() | Aerohive NetConfig 10.0r8a Local File Inclusion / Remote Code Execution Exploit | 15 Nov 202100:00 | โ | zdt |
![]() | Exploit for Inclusion of Functionality from Untrusted Control Sphere in Extremenetworks Aerohive Netconfig | 30 Aug 202012:18 | โ | githubexploit |
![]() | Exploit for Path Traversal in Saltstack Salt | 22 May 202007:56 | โ | githubexploit |
![]() | Aerohive NetConfig 10.0r8a Local File Inclusion / Remote Code Execution | 12 Nov 202100:00 | โ | packetstorm |
![]() | CVE-2020-16152 | 14 Nov 202120:08 | โ | cvelist |
![]() | Aerohive NetConfig 10.0r8a LFI and log poisoning to RCE | 23 Sep 202108:57 | โ | metasploit |
Source | Link |
---|---|
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
github | www.github.com/eriknl/CVE-2020-16152 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo