Home

Description

A malicious actor in Wi-Fi range of the affected product could leverage a vulnerability in the airMAX Wireless Protocol to achieve a remote code execution (RCE) within the affected product. Affected Products: airMAX AC (Version 8.7.20 and earlier) airMAX M (Version 6.3.22 and earlier) airFiber AF60-XG (Version 1.2.2 and earlier) airFiber AF60 (Version 2.6.7 and earlier) Mitigation: Update your airMAX AC to Version 8.7.21 or later. Update your airMAX M to Version 6.3.24 or later. Update your airFiber AF60-XG to Version 1.2.3 or later. Update your airFiber AF60 to Version 2.6.8 or later.

PUBLISHED Reserved 2026-01-01 | Published 2026-01-08 | Updated 2026-01-08 | Assigner hackerone

Product status

Default status
unaffected

Any version before 8.7.21
affected

Default status
unaffected

Any version before 6.3.24
affected

Default status
unaffected

Any version before 1.2.3
affected

Default status
unaffected

Any version before 2.6.8
affected

References

community.ui.com/...061/1e4fe5f8-29c7-4a7d-a518-01b1537983ba

cve.org (CVE-2026-21639)

nvd.nist.gov (CVE-2026-21639)

Download JSON