Command Injection in Cisco Systems, Inc products - CVE-2021-1552

 

Command Injection in Cisco Systems, Inc products - CVE-2021-1552

Published: May 21, 2021


Vulnerability identifier: #VU53417
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2021-1552
CWE-ID: CWE-77
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Cisco WAP125 Wireless-AC Dual Band Desktop Access Point with PoE
WAP131 Wireless-N Dual Radio Access Point with PoE
Cisco WAP150 Wireless-AC/N Dual Radio Access Point with PoE
WAP351 Wireless-N Dual Radio Access Point with 5-Port Switch
Cisco WAP361 Wireless-AC/N Dual Radio Wall Plate Access Point with PoE
WAP581 Wireless-AC Dual Radio Wave 2 Access Point with 2.5GbE LAN
Software vendor:
Cisco Systems, Inc

Description

The vulnerability allows a remote user to execute arbitrary commands on the target system.

The vulnerability exists due to improper input validation in the web-based management interface. A remote administrator can send a specially crafted HTTP request and execute arbitrary commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links