Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices using firmware version 5.1.x prior to 5.1.13 allows authenticated remote malicious users to escape the shell and escalate their privileges by adding a LocalCommand to the SSH configuration file in the user home folder.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
ucopia wireless_appliance_firmware |