Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0...
High severity
Unreviewed
Published
Nov 11, 2024
to the GitHub Advisory Database
•
Updated Nov 12, 2024
Description
Published by the National Vulnerability Database
Nov 11, 2024
Published to the GitHub Advisory Database
Nov 11, 2024
Last updated
Nov 12, 2024
Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices, this leads to wfaTGSendPing remote code execution as root via traffic to TCP port 8000 or 8080 on a LAN interface. On other devices, this may be exploitable over a WAN interface.
References