The Panel Designer dashboard in Airleader Master and Easy before 6.36 allows remote attackers to execute arbitrary commands via a wizard/workspace.jsp unrestricted file upload. To exploit this, the attacker must login to the administrator console (default credentials are weak and easily guessable) and upload a JSP file via the Panel Designer dashboard.
References
Link | Resource |
---|---|
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-036.txt | Exploit Third Party Advisory |
Configurations
History
16 Oct 2025, 20:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:airleader:easy:-:*:*:*:*:*:*:* cpe:2.3:h:airleader:master_ii\+:-:*:*:*:*:*:*:* cpe:2.3:o:airleader:master_ii\+_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:airleader:easy_firmware:*:*:*:*:*:*:*:* |
|
References | () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2025-036.txt - Exploit, Third Party Advisory | |
First Time |
Airleader master Ii\+
Airleader master Ii\+ Firmware Airleader easy Firmware Airleader easy Airleader |
12 Jun 2025, 16:06
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-10 15:15
Updated : 2025-10-16 20:57
NVD link : CVE-2025-46612
Mitre link : CVE-2025-46612
CVE.ORG link : CVE-2025-46612
JSON object : View
Products Affected
airleader
- easy_firmware
- master_ii\+_firmware
- easy
- master_ii\+
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type