OS Command Injection in Cisco Systems, Inc products - CVE-2021-1401

 

OS Command Injection in Cisco Systems, Inc products - CVE-2021-1401

Published: May 6, 2021


Vulnerability identifier: #VU52948
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-1401
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Cisco Small Business 100 Series Wireless Access Points
Cisco Small Business 300 Series Wireless Access Points
Cisco Small Business 500 Series Wireless Access Points
Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE
WAP131 Wireless-N Dual Radio Access Point with PoE
Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE
WAP351 Wireless-N Dual Radio Access Point with 5-Port Switch
Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE
Cisco WAP581 Wireless-AC Dual Radio Wave 2 Access Point
Software vendor:
Cisco Systems, Inc

Description

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the web-based management interface. A remote administrator can send a specially crafted HTTP request and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links