Note: Access Points running AOS-8 Instant software are not affected by this vulnerability.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 |
Tue, 12 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 |
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
ssvc
|
Tue, 12 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in the configuration processing logic of Access Points running AOS-10 could allow an authenticated remote attacker to execute system commands under certain pre-existing conditions. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system. Note: Access Points running AOS-8 Instant software are not affected by this vulnerability. | |
| Title | Inconsistent input filtering allows Authenticated Command Injection in AOS-10 CLI | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hpe
Published:
Updated: 2026-05-12T19:27:46.948Z
Reserved: 2026-01-16T15:22:49.224Z
Link: CVE-2026-23821
Updated: 2026-05-12T19:27:43.629Z
Status : Received
Published: 2026-05-12T19:16:28.840
Modified: 2026-05-12T20:16:31.153
Link: CVE-2026-23821
No data.
OpenCVE Enrichment
Updated: 2026-05-12T22:30:05Z