CVE-2015-4624

HIGH

Hak5 Wi-fi Pineapple Firmware - Improper Access Control

Title source: rule

Description

Hak5 WiFi Pineapple 2.0 through 2.3 uses predictable CSRF tokens.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/40609
metasploit WORKING POC EXCELLENT
by catatonicprime · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/pineapple_bypass_cmdinject.rb
metasploit WORKING POC EXCELLENT
by catatonicprime · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/pineapple_preconfig_cmdinject.rb

Scores

CVSS v3 7.5
EPSS 0.4762
EPSS Percentile 97.7%
Attack Vector ADJACENT_NETWORK
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-284
Status published
Products (4)
hak5/wi-fi_pineapple_firmware 2.0
hak5/wi-fi_pineapple_firmware 2.1
hak5/wi-fi_pineapple_firmware 2.2
hak5/wi-fi_pineapple_firmware 2.3
Published Mar 31, 2017
Tracked Since Feb 18, 2026