Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Ucopia Subscribe
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-25035 1 Ucopia 1 Express Wireless Appliance 2021-02-04 7.2 HIGH 6.7 MEDIUM
UCOPIA Wi-Fi appliances 6.0.5 allow arbitrary code execution with root privileges using chroothole_client's PHP call, a related issue to CVE-2017-11322.
CVE-2020-25036 1 Ucopia 1 Ucopia Wireless Appliance 2021-02-04 9.0 HIGH 8.8 HIGH
UCOPIA Wi-Fi appliances 6.0.5 allow authenticated remote attackers to escape the restricted administration shell CLI, and access a shell with admin user rights, via an unprotected less command.
CVE-2020-25037 1 Ucopia 1 Ucopia Wireless Appliance 2021-02-04 7.2 HIGH 8.2 HIGH
UCOPIA Wi-Fi appliances 6.0.5 allow arbitrary code execution with admin user privileges via an escape from a restricted command.
CVE-2017-11321 1 Ucopia 1 Wireless Appliance 2020-10-02 6.5 MEDIUM 7.2 HIGH
The restricted shell interface in UCOPIA Wireless Appliance before 5.1.8 allows remote authenticated users to gain 'admin' privileges via shell metacharacters in the less command.
CVE-2018-15481 1 Ucopia 2 Wireless Appliance, Wireless Appliance Firmware 2019-10-02 6.5 MEDIUM 8.8 HIGH
Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices using firmware version 5.1.x before 5.1.13 allows authenticated remote attackers to escape the shell and escalate their privileges by adding a LocalCommand to the SSH configuration file in the user home folder.
CVE-2017-11322 1 Ucopia 1 Ucopia Wireless Appliance 2019-10-02 7.2 HIGH 8.2 HIGH
The chroothole_client executable in UCOPIA Wireless Appliance before 5.1.8 allows remote attackers to gain root privileges via a dollar sign ($) metacharacter in the argument to chroothole_client.
CVE-2017-17743 1 Ucopia 2 Wireless Appliance, Wireless Appliance Firmware 2018-04-18 6.5 MEDIUM 6.7 MEDIUM
Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices before 4.4.20, 5.0.x before 5.0.19, and 5.1.x before 5.1.11 allows authenticated remote attackers to escape the shell and escalate their privileges by uploading a .bashrc file containing the /bin/sh string. In some situations, authentication can be achieved via the bhu85tgb default password for the admin account.