Xiaomi AX9000 Router Vulnerable to Post-Authentication Command Injection
CVE-2023-26315
8.8HIGH
Summary
The Xiaomi Router AX9000 is affected by a post-authentication command injection vulnerability. This issue arises from a lack of proper input filtering, enabling attackers to execute arbitrary commands on the device after authentication. By exploiting this vulnerability, an attacker can gain root access, compromising the integrity and confidentiality of the router and potentially the network it connects to. It is crucial for users of the Xiaomi Router AX9000 to apply recommended security updates and employ best practices for device configuration to mitigate the risk associated with this vulnerability.
Affected Version(s)
Router AX9000 1.0.0 <= 1.0.168
References
EPSS Score
40% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved