RCE in AirOS 6.2.0 Devices with CSRF bypass
Team Summary
Official summary from Ubiquiti Inc.
There are certain end-points containing functionalities that are vulnerable to command injection. It is possible to craft an input string that passes the filter check but still contains commands, resulting in remote code execution. These vulnerabilities can be also can be also paired with other end points vulnerable with XSS and CSRF, allowing attacker to perform different actions, including modify configuration, upload arbitrary firmware, exfiltrate files and tokens. These vulnerabilities were found on AirMax AirMax AirOS v6.2.0 and prior versions for TI, XW and XM boards. The fix for these vulnerabilities were included in the new version of AirMax AirOS firmware v6.3.0 for TI, XW and XM boards. For more details please visit: https://community.ui.com/releases/airMAX-M-v6-3-0/c8d5dec9-4030-4d7e-b23f-6a5b35ed3d83 https://www.ui.com/download/airmax-m
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Command Injection - Generic