CVE-2014-3686 — Improper Input Validation in Hostapd
Severity
6.8MEDIUMNVD
EPSS
4.7%
top 10.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 16
Latest updateMay 17
Description
wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
CVSS vector
AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4
Affected Packages2 packages
Also affects: Debian Linux 6.0, Ubuntu Linux 10.04, 12.04, 14.04
🔴Vulnerability Details
3📋Vendor Advisories
3💬Community
5Bugzilla▶
CVE-2014-3686 hostapd: wpa_cli and hostapd_cli remote command execution issue [fedora-all]↗2014-10-10
Bugzilla
▶
Bugzilla▶
CVE-2014-3686 wpa_supplicant and hostapd: wpa_cli and hostapd_cli remote command execution issue↗2014-10-10
Bugzilla▶
CVE-2014-3686 wpa_supplicant: wpa_supplicant and hostapd: wpa_cli and hostapd_cli remote command execution issue [fedora-all]↗2014-10-10
Bugzilla
▶