CVE-2017-5259

HIGH EXPLOITED IN THE WILD

Cambium Networks cnPilot <4.3.2-R4 - Privilege Escalation

Title source: llm

Description

In versions 4.3.2-R4 and prior of Cambium Networks cnPilot firmware, an undocumented, root-privilege administration web shell is available using the HTTP path https://<device-ip-or-hostname>/adm/syscmd.asp.

Exploits (1)

metasploit WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/cnpilot_r_cmd_exec.rb

Scores

CVSS v3 8.8
EPSS 0.6634
EPSS Percentile 98.5%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2024-01-03
InTheWild.io 2024-05-29
CWE
CWE-319 CWE-489
Status published
Products (6)
Cambium Networks/cnPilot 4.3.2-R4 and prior
cambiumnetworks/cnpilot_e400_firmware < 4.3.2-r4
cambiumnetworks/cnpilot_e410_firmware < 4.3.2-r4
cambiumnetworks/cnpilot_e600_firmware < 4.3.2-r4
cambiumnetworks/cnpilot_r190n_firmware < 4.3.2-r4
cambiumnetworks/cnpilot_r190v_firmware < 4.3.2-r4
Published Dec 20, 2017
Tracked Since Feb 18, 2026