CVE-2017-5255
HIGHCambium Networks ePMP <3.5 - Command Injection
Title source: llmDescription
In version 3.5 and prior of Cambium Networks ePMP firmware, a lack of input sanitation for certain parameters on the web management console allows any authenticated user (including the otherwise low-privilege readonly user) to inject shell meta-characters as part of a specially-crafted POST request to the get_chart function and run OS-level commands, effectively as root.
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotecgi
https://www.exploit-db.com/exploits/43413
metasploit
WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/epmp1000_ping_cmd_exec.rb
metasploit
WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/epmp1000_get_chart_cmd_exec.rb
metasploit
WORKING POC
EXCELLENT
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/epmp1000_ping_cmd_shell.rb
metasploit
WORKING POC
EXCELLENT
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/epmp1000_get_chart_cmd_shell.rb
Scores
CVSS v3
8.8
EPSS
0.7142
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (3)
Cambium Networks/ePMP
3.5 and prior
cambiumnetworks/epmp_1000_firmware
< 3.5
cambiumnetworks/epmp_2000_firmware
< 3.5
Published
Dec 20, 2017
Tracked Since
Feb 18, 2026