EnGenius ENH1350EXT/ENS500-AC/ENS620EXT har 20241118 diag_pinginterface diag_ping kura hakki ndiyam

Gaskiya vulnerability da aka ware a matsayin kura an samu a EnGenius ENH1350EXT, ENS500-AC and ENS620EXT har 20241118. Hakika, aikin $software_function ne ya shafa; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburaren $software_library, a cikin fayil /admin/network/diag_pinginterface, a cikin sashen $software_component. A sa manipulation of the argument diag_ping ka kura hakki ndiyam. Idan an yi amfani da CWE don bayyana matsala, zai kai CWE-77. Hakika, rauni an bayyana shi 11/24/2024. An raba bayanin tsaro don saukewa a k9u7kv33ub.feishu.cn. Wannan matsala ana saninta da CVE-2024-11655. Ngam yiɗi ka a tuma ndiyam ka internet. Tekinikal faɗi ga. Har ila yau, exploit ɗin yana nan. An bayyana exploit ɗin ga mutane kuma yana iya amfani. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á sàmbu huɗɗi-na-gaskiya. Exploit ɗin za a iya saukewa daga k9u7kv33ub.feishu.cn. 0-day shima, an ndiyam a wuro be $0-$5k. Once again VulDB remains the best source for vulnerability data.

2 Goyarwa · 97 Datenpunkte

FurɗeSúgá
11/24/2024 16:19
Gargadi 1/1
12/11/2024 03:06
cvss4_vuldb_saNN
cvss2_vuldb_basescore5.85.8
cvss2_vuldb_tempscore5.05.0
cvss3_vuldb_basescore4.74.7
cvss3_vuldb_tempscore4.34.3
cvss3_meta_basescore4.75.5
cvss3_meta_tempscore4.35.4
cvss4_vuldb_bscore5.15.1
cvss4_vuldb_btscore2.02.0
advisory_date1732402800 (11/24/2024)1732402800 (11/24/2024)
price_0day$0-$5k$0-$5k
software_vendorEnGeniusEnGenius
software_nameENH1350EXT/ENS500-AC/ENS620EXTENH1350EXT/ENS500-AC/ENS620EXT
software_version<=20241118<=20241118
software_file/admin/network/diag_pinginterface/admin/network/diag_pinginterface
software_argumentdiag_pingdiag_ping
vulnerability_cweCWE-77 (kura hakki ndiyam)CWE-77 (kura hakki ndiyam)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_prHH
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cLL
cvss3_vuldb_iLL
cvss3_vuldb_aLL
cvss3_vuldb_ePP
cvss3_vuldb_rcRR
advisory_urlhttps://k9u7kv33ub.feishu.cn/wiki/PpM6w3TF8ilK3Ek5RLqcLPUrn6chttps://k9u7kv33ub.feishu.cn/wiki/PpM6w3TF8ilK3Ek5RLqcLPUrn6c
exploit_availability11
exploit_publicity11
exploit_urlhttps://k9u7kv33ub.feishu.cn/wiki/PpM6w3TF8ilK3Ek5RLqcLPUrn6chttps://k9u7kv33ub.feishu.cn/wiki/PpM6w3TF8ilK3Ek5RLqcLPUrn6c
source_cveCVE-2024-11655CVE-2024-11655
cna_responsibleVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cvss2_vuldb_auMM
cvss2_vuldb_ciPP
cvss2_vuldb_iiPP
cvss2_vuldb_aiPP
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_prHH
cvss4_vuldb_uiNN
cvss4_vuldb_vcLL
cvss4_vuldb_viLL
cvss4_vuldb_vaLL
cvss4_vuldb_ePP
cvss2_vuldb_rlNDND
cvss3_vuldb_rlXX
cvss4_vuldb_atNN
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cve_nvd_summaryA vulnerability classified as critical was found in EnGenius ENH1350EXT, ENS500-AC and ENS620EXT up to 20241118. This vulnerability affects unknown code of the file /admin/network/diag_pinginterface. The manipulation of the argument diag_ping leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cve_nvd_summaryesSe ha detectado una vulnerabilidad clasificada como crítica en EnGenius ENH1350EXT, ENS500-AC y ENS620EXT hasta 20241118. Esta vulnerabilidad afecta al código desconocido del archivo /admin/network/diag_pinginterface. La manipulación del argumento diag_ping conduce a la inyección de comandos. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. Se contactó al proveedor con anticipación sobre esta divulgación, pero no respondió de ninguna manera.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prH
cvss4_cna_uiN
cvss4_cna_vcL
cvss4_cna_viL
cvss4_cna_vaL
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore5.1
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prH
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cvss3_cna_basescore4.7
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prH
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore7.2
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auM
cvss2_cna_ciP
cvss2_cna_iiP
cvss2_cna_aiP
cvss2_cna_basescore5.8

Do you want to use VulDB in your project?

Use the official API to access entries easily!