We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
EnGenius ENH1350EXT A8J-ENH1350EXT devices through 3.9.3.2_c1.9.51 allow (blind) OS Command Injection via shell metacharacters to the Ping or Speed Test utility. During the time of initial setup, the device creates an open unsecured network whose admin panel is configured with the default credentials of admin/admin. An unauthorized attacker in proximity to the Wi-Fi network can exploit this window of time to execute arbitrary OS commands with root-level permissions.
Reserved 2024-08-25 | Published 2024-10-24 | Updated 2024-10-28 | Assigner mitregithub.com/...in/Engenius/CVE-2024-45242_Extended_Report.pdf
github.com/actuator/cve/blob/main/Engenius/CVE-2024-45242
Support options