CVE-2015-4624
HIGHHak5 Wi-fi Pineapple Firmware - Improper Access Control
Title source: ruleDescription
Hak5 WiFi Pineapple 2.0 through 2.3 uses predictable CSRF tokens.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/40609
metasploit
WORKING POC
EXCELLENT
by catatonicprime · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/pineapple_bypass_cmdinject.rb
metasploit
WORKING POC
EXCELLENT
by catatonicprime · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/pineapple_preconfig_cmdinject.rb
References (4)
Scores
CVSS v3
7.5
EPSS
0.4762
EPSS Percentile
97.7%
Attack Vector
ADJACENT_NETWORK
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-284
Status
published
Products (4)
hak5/wi-fi_pineapple_firmware
2.0
hak5/wi-fi_pineapple_firmware
2.1
hak5/wi-fi_pineapple_firmware
2.2
hak5/wi-fi_pineapple_firmware
2.3
Published
Mar 31, 2017
Tracked Since
Feb 18, 2026