Full title: ARRIS VAP2500 Management Portal Remote Command Execution Vulnerability Category: remote exploits Platform: hardware ARRIS VAP2500 - WIRELESS VIDEO ACCESS POINT This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of ARRIS VAP2500. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of access to the management portal. The issue lies in the ability to execute arbitrary commands without any sanitization. An attacker can leverage this vulnerability to execute code with root privileges. # 0day.today @ http://0day.today/