CVE-2017-5259
HIGH EXPLOITED IN THE WILDCambium Networks cnPilot <4.3.2-R4 - Privilege Escalation
Title source: llmDescription
In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, an undocumented, root-privilege administration web shell is available using the HTTP path https://<device-ip-or-hostname>/adm/syscmd.asp.
Exploits (1)
metasploit
WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/cnpilot_r_cmd_exec.rb
Scores
CVSS v3
8.8
EPSS
0.6634
EPSS Percentile
98.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-01-03
InTheWild.io
2024-05-29
CWE
CWE-319
CWE-489
Status
published
Products (6)
Cambium Networks/cnPilot
4.3.2-R4 and prior
cambiumnetworks/cnpilot_e400_firmware
< 4.3.2-r4
cambiumnetworks/cnpilot_e410_firmware
< 4.3.2-r4
cambiumnetworks/cnpilot_e600_firmware
< 4.3.2-r4
cambiumnetworks/cnpilot_r190n_firmware
< 4.3.2-r4
cambiumnetworks/cnpilot_r190v_firmware
< 4.3.2-r4
Published
Dec 20, 2017
Tracked Since
Feb 18, 2026