Overview
- Description
- On certain Ubiquiti devices, Command Injection exists via a GET request to stainfo.cgi (aka Show AP info) because the ifname variable is not sanitized, as demonstrated by shell metacharacters. The fixed version is v4.0.1 for 802.11 ISP products, v5.3.5 for AirMax ISP products, and v5.4.5 for AirSync firmware. For example, Nanostation5 (Air OS) is affected.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Known exploits
Data from CISA
- Vulnerability name
- Ubiquiti AirOS Command Injection Vulnerability
- Exploit added on
- Apr 15, 2022
- Exploit action due
- May 6, 2022
- Required action
- Apply updates per vendor instructions.
Weaknesses
- nvd@nist.gov
- CWE-77
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4115A638-71CD-4EB8-9522-CDA8552959B6", "versionEndExcluding": "4.0.1" }, { "criteria": "cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73EC763B-DF91-4062-868A-2863619C2C01", "versionEndExcluding": "5.3.5", "versionStartIncluding": "4.0.2" }, { "criteria": "cpe:2.3:o:ui:airos:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "133DCE2B-EE25-4BFF-A290-1D4A803DEC3E", "versionEndExcluding": "5.4.5", "versionStartIncluding": "5.3.6" } ], "operator": "OR" } ] } ]