Skip to content
CVSS 8.8 · HIGH

CVE-2026-7503

A vulnerability was detected in code-projects for Plugin 4.1.2cu.5137. The impacted element is the function setWiFiMultipleConfig in the library /lib/cste_modules/wireless.so of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument wepkey2 results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Ver en NVD

Análisis

This vulnerability affects specific firmware components for low-end or white-label networking hardware (indicated by the cstecgi.cgi path). It is not relevant to the MexicoDev community's focus on professional web, mobile, or backend development and server administration.

Severidad

Puntaje: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-119CWE-120

EPSS

Probabilidad de explotación (próx. 30 días): 0.0005 (0.0%)
Percentil: 14.8%
EPSS: 2026-05-06

Descripción técnica

A vulnerability was detected in code-projects for Plugin 4.1.2cu.5137. The impacted element is the function setWiFiMultipleConfig in the library /lib/cste_modules/wireless.so of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument wepkey2 results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Publicada: 30/4/2026, 22:16:26
Última modificación: 1/5/2026, 15:26:24

Referencias

InicioEventosBlogRecursosEquipo