The Panel Designer dashboard in Airleader Master and Easy before 6.36 allows remote attackers to execute arbitrary commands via a wizard/workspace.jsp unrestricted file upload. To exploit this, the attacker must login to the administrator console (default credentials are weak and easily guessable) and upload a JSP file via the Panel Designer dashboard.
References
| Link | Resource |
|---|---|
| https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-036.txt | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-06-10 15:15
Updated : 2025-10-16 20:57
NVD link : CVE-2025-46612
Mitre link : CVE-2025-46612
CVE.ORG link : CVE-2025-46612
JSON object : View
Products Affected
airleader
- easy
- easy_firmware
- master_ii\+_firmware
- master_ii\+
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
