The EnGenius EWS660AP router with firmware 2.0.284 allows an attacker to execute arbitrary commands using the built-in ping and traceroute utilities by using different payloads and injecting multiple parameters. This vulnerability is fixed in a later firmware version.
References
Link | Resource |
---|---|
https://www.engeniustech.com/engenius-products/managed-outdoor-wireless-ews660ap/ | Product Vendor Advisory |
https://securityshards.wordpress.com/2019/04/21/cve-2019-11353-engenius-ews660ap-arbitrary-code-execution/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-05-09 07:29
Updated : 2020-08-24 10:37
NVD link : CVE-2019-11353
Mitre link : CVE-2019-11353
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
engeniustech
- ews660ap_firmware
- ews660ap