We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability in the web-based management interface of the Wireless LAN Controller feature of Cisco IOS XE Software could allow an authenticated, remote attacker with a lobby ambassador user account to perform a command injection attack against an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with privilege level 15. Note: This vulnerability is exploitable only if the attacker obtains the credentials for a lobby ambassador account. This account is not configured by default.
Reserved 2024-10-10 | Published 2025-05-07 | Updated 2025-05-08 | Assigner ciscoImproper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
sec.cloudapps.cisco.com/...ry/cisco-sa-webui-cmdinj-gVn3OKNC (cisco-sa-webui-cmdinj-gVn3OKNC)
Support options