Lucene search

K
CambiumnetworksCnpilot E600 Firmware

5 matches found

CVE
CVE
added 2017/12/20 10:29 p.m.83 views

CVE-2017-5259

In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, an undocumented, root-privilege administration web shell is available using the HTTP path https:///adm/syscmd.asp.

9CVSS8.6AI score0.59538EPSS
CVE
CVE
added 2017/12/20 10:29 p.m.53 views

CVE-2017-5260

In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, although the option to access the configuration file is not available in the normal web administrative console for the 'user' account, the configuration file is accessible via direct object reference (DRO) at http:///goform/down_c...

9CVSS8.6AI score0.33387EPSS
CVE
CVE
added 2017/12/20 10:29 p.m.42 views

CVE-2017-5261

In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, the 'ping' and 'traceroute' functions of the web administrative console expose a file path traversal vulnerability, accessible to all authenticated users.

8.8CVSS8.5AI score0.24144EPSS
CVE
CVE
added 2017/12/20 10:29 p.m.42 views

CVE-2017-5262

In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, the SNMP read-only (RO) community string has access to sensitive information by OID reference.

8CVSS7.6AI score0.07842EPSS
CVE
CVE
added 2017/12/20 10:29 p.m.34 views

CVE-2017-5263

Versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware lack CSRF controls that can mitigate the effects of CSRF attacks, which are most typically implemented as randomized per-session tokens associated with any web application function, especially destructive ones.

8CVSS7.8AI score0.00039EPSS