Jaguar77 Posted March 17, 2017 Posted March 17, 2017 title: Authenticated Command Injection product: Multiple Ubiquiti Networks products, e.g. TS-16-CARRIER, TS-5-POE, TS-8-PRO, AG-HP-2G16, AG-HP-2G20, AG-HP-5G23, AG-HP-5G27, AirGrid M, AirGrid M2, AirGrid M5, AR, AR-HP, BM2HP, BM2-Ti, BM5HP, BM5-Ti, LiteStation M5, locoM2, locoM5, locoM9, M2, M3, M365, M5, M900, NB-2G18, NB-5G22, NB-5G25, NBM3, NBM365, NBM9, NSM2, NSM3, NSM365, NSM5, PBM10, PBM3, PBM365, PBM5, PICOM2HP, Power AP N vulnerable version: v1.3.3 (SW), v5.6.9/v6.0 (XM) Вставить ник Quote
rdc Posted March 17, 2017 Posted March 17, 2017 Есть общее решение - ip-адреса устройств должны быть в отдельном влане, и недоступны из публичных сетей. Вставить ник Quote
TTvs Posted March 18, 2017 Posted March 18, 2017 (edited) Так, а на какую версию обновлять? 6.0.1 ? Edited March 18, 2017 by TTvs Вставить ник Quote
toxamash Posted March 19, 2017 Posted March 19, 2017 command injection может эксплуатировать только авторизованный пользователь!!! Вставить ник Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.