CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
58.8%
OS command injection vulnerability exists in Wi-Fi AP UNIT allows. If this vulnerability is exploited, a remote authenticated attacker with an administrative privilege to execute an arbitrary OS command. Affected products and versions are as follows: AC-PD-WAPU v1.05_B04 and earlier, AC-PD-WAPUM v1.05_B04 and earlier, AC-PD-WAPU-P v1.05_B04P and earlier, AC-PD-WAPUM-P v1.05_B04P and earlier, AC-WAPU-300 v1.00_B07 and earlier, AC-WAPUM-300 v1.00_B07 and earlier, AC-WAPU-300-P v1.00_B07 and earlier, and AC-WAPUM-300-P v1.00_B07 and earlier
Vendor | Product | Version | CPE |
---|---|---|---|
inaba | ac-pd-wapu_firmware | * | cpe:2.3:o:inaba:ac-pd-wapu_firmware:*:*:*:*:*:*:*:* |
inaba | ac-pd-wapu | - | cpe:2.3:h:inaba:ac-pd-wapu:-:*:*:*:*:*:*:* |
inaba | ac-pd-wapum_firmware | * | cpe:2.3:o:inaba:ac-pd-wapum_firmware:*:*:*:*:*:*:*:* |
inaba | ac-pd-wapum | - | cpe:2.3:h:inaba:ac-pd-wapum:-:*:*:*:*:*:*:* |
inaba | ac-pd-wapu-p_firmware | * | cpe:2.3:o:inaba:ac-pd-wapu-p_firmware:*:*:*:*:*:*:*:* |
inaba | ac-pd-wapu-p | - | cpe:2.3:h:inaba:ac-pd-wapu-p:-:*:*:*:*:*:*:* |
inaba | ac-pd-wapum-p_firmware | * | cpe:2.3:o:inaba:ac-pd-wapum-p_firmware:*:*:*:*:*:*:*:* |
inaba | ac-pd-wapum-p | - | cpe:2.3:h:inaba:ac-pd-wapum-p:-:*:*:*:*:*:*:* |
inaba | ac-wapu-300_firmware | * | cpe:2.3:o:inaba:ac-wapu-300_firmware:*:*:*:*:*:*:*:* |
inaba | ac-wapu-300 | - | cpe:2.3:h:inaba:ac-wapu-300:-:*:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
58.8%