CVE-2017-5255

HIGH

Cambium Networks ePMP <3.5 - Command Injection

Title source: llm

Description

In version 3.5 and prior of Cambium Networks ePMP firmware, a lack of input sanitation for certain parameters on the web management console allows any authenticated user (including the otherwise low-privilege readonly user) to inject shell meta-characters as part of a specially-crafted POST request to the get_chart function and run OS-level commands, effectively as root.

Exploits (5)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotecgi
https://www.exploit-db.com/exploits/43413
metasploit WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/epmp1000_ping_cmd_exec.rb
metasploit WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/epmp1000_get_chart_cmd_exec.rb
metasploit WORKING POC EXCELLENT
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/epmp1000_ping_cmd_shell.rb
metasploit WORKING POC EXCELLENT
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/epmp1000_get_chart_cmd_shell.rb

Scores

CVSS v3 8.8
EPSS 0.7142
EPSS Percentile 98.7%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (3)
Cambium Networks/ePMP 3.5 and prior
cambiumnetworks/epmp_1000_firmware < 3.5
cambiumnetworks/epmp_2000_firmware < 3.5
Published Dec 20, 2017
Tracked Since Feb 18, 2026