The restricted shell interface in UCOPIA Wireless Appliance before 5.1.8 allows remote authenticated users to gain 'admin' privileges via shell metacharacters in the less command.
                
            References
                    | Link | Resource | 
|---|---|
| https://sysdream.com/news/lab/2017-09-29-cve-2017-11321-ucopia-wireless-appliance-5-1-8-restricted-shell-escape/ | Exploit | 
| https://www.exploit-db.com/exploits/42937/ | Exploit Third Party Advisory VDB Entry | 
| https://sysdream.com/news/lab/2017-09-29-cve-2017-11321-ucopia-wireless-appliance-5-1-8-restricted-shell-escape/ | Exploit | 
| https://www.exploit-db.com/exploits/42937/ | Exploit Third Party Advisory VDB Entry | 
Configurations
                    History
                    21 Nov 2024, 03:07
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://sysdream.com/news/lab/2017-09-29-cve-2017-11321-ucopia-wireless-appliance-5-1-8-restricted-shell-escape/ - Exploit | |
| References | () https://www.exploit-db.com/exploits/42937/ - Exploit, Third Party Advisory, VDB Entry | 
Information
                Published : 2017-10-03 01:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-11321
Mitre link : CVE-2017-11321
CVE.ORG link : CVE-2017-11321
JSON object : View
Products Affected
                ucopia
- wireless_appliance
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
