A vulnerability in the implementation of a CLI command in Cisco Aironet Access Points (AP) could allow an authenticated, local attacker to overwrite files in the flash memory of the device. This vulnerability is due to insufficient input validation for a specific command. An attacker could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to overwrite or create files with data that is already present in other files that are hosted on the affected device.
Metrics
Affected Vendors & Products
References
History
Sat, 09 Nov 2024 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2021-03-24T20:20:38.878927Z
Updated: 2024-11-08T23:30:28.527Z
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1423
Vulnrichment
Updated: 2024-08-03T16:11:16.924Z
NVD
Status : Modified
Published: 2021-03-24T21:15:13.443
Modified: 2024-11-21T05:44:19.837
Link: CVE-2021-1423
Redhat
No data.