An authenticated remote code execution vulnerability in PowerStick Wave Dual-Band Wifi Extender V1.0 allows an attacker with valid credentials to execute arbitrary commands with root privileges. The issue stems from insufficient sanitization of user-supplied input in the /cgi-bin/cgi_vista.cgi executable, which is passed to a system-level function call.
Metrics
Affected Vendors & Products
References
History
Mon, 28 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-78 | |
Metrics |
cvssV3_1
|
Mon, 28 Jul 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authenticated remote code execution vulnerability in PowerStick Wave Dual-Band Wifi Extender V1.0 allows an attacker with valid credentials to execute arbitrary commands with root privileges. The issue stems from insufficient sanitization of user-supplied input in the /cgi-bin/cgi_vista.cgi executable, which is passed to a system-level function call. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-07-28T00:00:00.000Z
Updated: 2025-07-28T19:53:35.499Z
Reserved: 2025-03-11T00:00:00.000Z
Link: CVE-2025-29534

Updated: 2025-07-28T19:52:24.497Z

Status : Awaiting Analysis
Published: 2025-07-28T20:17:44.480
Modified: 2025-07-29T14:14:29.590
Link: CVE-2025-29534

No data.