A vulnerability in the implementation of a CLI command in Cisco Aironet Access Points (AP) could allow an authenticated, local attacker to overwrite files in the flash memory of the device. This vulnerability is due to insufficient input validation for a specific command. An attacker could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to overwrite or create files with data that is already present in other files that are hosted on the affected device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-foverwrt-HyVXvrtb | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2021-03-24T00:00:00
Updated: 2021-03-24T20:20:38
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1423
JSON object: View
NVD Information
Status : Modified
Published: 2021-03-24T21:15:13.443
Modified: 2023-11-07T03:28:16.720
Link: CVE-2021-1423
JSON object: View
Redhat Information
No data.
CWE