- Description
- On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4.0.1 for 802.11 ISP products, v5.3.5 for AirMax ISP products, and v5.4.5 for AirSync firmware. For example, Nanostation5 (Air OS) is affected.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Data from CISA
- Vulnerability name
- Ubiquiti AirOS Command Injection Vulnerability
- Exploit added on
- Apr 15, 2022
- Exploit action due
- May 6, 2022
- Required action
- Apply updates per vendor instructions.
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4115A638-71CD-4EB8-9522-CDA8552959B6",
"versionEndExcluding": "4.0.1"
},
{
"criteria": "cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "73EC763B-DF91-4062-868A-2863619C2C01",
"versionEndExcluding": "5.3.5",
"versionStartIncluding": "4.0.2"
},
{
"criteria": "cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "133DCE2B-EE25-4BFF-A290-1D4A803DEC3E",
"versionEndExcluding": "5.4.5",
"versionStartIncluding": "5.3.6"
}
],
"operator": "OR"
}
]
}
]