- Description
- A vulnerability was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/sn_package/sn_https. The manipulation of the argument https_enable leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
- Source
- cna@vuldb.com
- NVD status
- Analyzed
CVSS 4.0
- Type
- Secondary
- Base score
- 5.1
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- MEDIUM
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Secondary
- Base score
- 5.8
- Impact score
- 6.4
- Exploitability score
- 6.4
- Vector string
- AV:N/AC:L/Au:M/C:P/I:P/A:P
- Hype score
- Not currently trending
🚨 CVE-2024-11652 (Published: 2024-11-25) - A critical vulnerability in EnGenius products! Affects multiple versions. Ensure your systems are updated to the latest firmware to mitigate risks. For more details, visit: https://t.co/POQJucXDIR #CyberSecurity #Vulnerability #EnGenius
@transilienceai
27 Nov 2024
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-11652 (Published: 2024-11-25) affects EnGenius products. Vulnerable versions are at risk! 🛡️ Ensure your systems are updated to the latest firmware to mitigate potential exploits. For detailed remediation steps, check out the link: https://t.co/V0cn9LaACB… https://t.
@transilienceai
27 Nov 2024
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-11652 (Published: 2024-11-25) affects EnGenius products. Vulnerable versions are at risk! 🔒 Ensure your systems are updated to the latest firmware to mitigate potential exploits. For detailed remediation steps, check out the link: https://t.co/V0cn9LaACB… https://t.c
@transilienceai
27 Nov 2024
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-11652 (Published: 2024-11-25) affects EnGenius products. Exploited versions are vulnerable, so immediate action is crucial! 🛡️ Ensure you update to the latest firmware and apply all recommended patches to safeguard your systems. More info: https://t.co/V0cn9LaACB… ht
@transilienceai
27 Nov 2024
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:engeniustech:ens500-ac:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "07C3A46A-BB2E-4A7A-BA32-7E02E75E8AE0"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]