An issue exists on Mimosa Client Radios prior to 2.2.4 and Mimosa Backhaul Radios prior to 2.2.4. On the backend of the device's web interface, there are some diagnostic tests available that are not displayed on the webpage; these are only accessible by crafting a POST request with a program like cURL. There is one test accessible via cURL that does not properly sanitize user input, allowing an malicious user to execute shell commands as the root user.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mimosa client radios |
||
mimosa backhaul radios |