Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown

CVE-2022-44720

Disclosure Date: June 29, 2023 (last updated February 25, 2025)
An issue was discovered in Weblib Ucopia before 6.0.13. OS Command Injection injection can occur, related to chroot.
Attacker Value
Unknown

CVE-2022-44719

Disclosure Date: June 29, 2023 (last updated February 25, 2025)
An issue was discovered in Weblib Ucopia before 6.0.13. The SSH Server has Insecure Permissions.
Attacker Value
Unknown

CVE-2020-25036

Disclosure Date: February 02, 2021 (last updated February 22, 2025)
UCOPIA Wi-Fi appliances 6.0.5 allow authenticated remote attackers to escape the restricted administration shell CLI, and access a shell with admin user rights, via an unprotected less command.
Attacker Value
Unknown

CVE-2020-25035

Disclosure Date: February 02, 2021 (last updated November 28, 2024)
UCOPIA Wi-Fi appliances 6.0.5 allow arbitrary code execution with root privileges using chroothole_client's PHP call, a related issue to CVE-2017-11322.
Attacker Value
Unknown

CVE-2020-25037

Disclosure Date: February 02, 2021 (last updated February 22, 2025)
UCOPIA Wi-Fi appliances 6.0.5 allow arbitrary code execution with admin user privileges via an escape from a restricted command.
Attacker Value
Unknown

CVE-2019-1649

Disclosure Date: May 14, 2019 (last updated November 27, 2024)
A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious softw…
Attacker Value
Unknown

CVE-2018-15481

Disclosure Date: August 21, 2018 (last updated November 27, 2024)
Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices using firmware version 5.1.x before 5.1.13 allows authenticated remote attackers to escape the shell and escalate their privileges by adding a LocalCommand to the SSH configuration file in the user home folder.
0
Attacker Value
Unknown

CVE-2017-17743

Disclosure Date: March 22, 2018 (last updated November 26, 2024)
Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices before 4.4.20, 5.0.x before 5.0.19, and 5.1.x before 5.1.11 allows authenticated remote attackers to escape the shell and escalate their privileges by uploading a .bashrc file containing the /bin/sh string. In some situations, authentication can be achieved via the bhu85tgb default password for the admin account.
0
Attacker Value
Unknown

CVE-2017-11322

Disclosure Date: October 03, 2017 (last updated November 26, 2024)
The chroothole_client executable in UCOPIA Wireless Appliance before 5.1.8 allows remote attackers to gain root privileges via a dollar sign ($) metacharacter in the argument to chroothole_client.
0
Attacker Value
Unknown

CVE-2017-11321

Disclosure Date: October 03, 2017 (last updated November 26, 2024)
The restricted shell interface in UCOPIA Wireless Appliance before 5.1.8 allows remote authenticated users to gain 'admin' privileges via shell metacharacters in the less command.