Vulnerability Details CVE-2017-5259
In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, an undocumented, root-privilege administration web shell is available using the HTTP path https://<device-ip-or-hostname>/adm/syscmd.asp.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.595
EPSS Ranking 98.1%
CVSS Severity
CVSS v3 Score 8.8
CVSS v2 Score 9.0
Products affected by CVE-2017-5259
-
cpe:2.3:h:cambiumnetworks:cnpilot_e400:-
-
cpe:2.3:h:cambiumnetworks:cnpilot_e410:-
-
cpe:2.3:h:cambiumnetworks:cnpilot_e600:-
-
cpe:2.3:h:cambiumnetworks:cnpilot_r190n:-
-
cpe:2.3:h:cambiumnetworks:cnpilot_r190v:-
-
cpe:2.3:o:cambiumnetworks:cnpilot_e400_firmware:-
-
cpe:2.3:o:cambiumnetworks:cnpilot_e400_firmware:4.3.2-r4
-
cpe:2.3:o:cambiumnetworks:cnpilot_e410_firmware:-
-
cpe:2.3:o:cambiumnetworks:cnpilot_e410_firmware:4.3.2-r4
-
cpe:2.3:o:cambiumnetworks:cnpilot_e600_firmware:-
-
cpe:2.3:o:cambiumnetworks:cnpilot_e600_firmware:4.3.2-r4
-
cpe:2.3:o:cambiumnetworks:cnpilot_r190n_firmware:-
-
cpe:2.3:o:cambiumnetworks:cnpilot_r190n_firmware:4.3.2-r4
-
cpe:2.3:o:cambiumnetworks:cnpilot_r190v_firmware:-
-
cpe:2.3:o:cambiumnetworks:cnpilot_r190v_firmware:4.3.2-r4