Korenix Jetwave
Korenix JetWave wireless access points and bridges contain command injection (CWE-77) and resource exhaustion (CWE-400) vulnerabilities. Successful exploitation allows an attacker with network access and valid credentials to execute arbitrary commands with operating-system-level privileges or cause a denial-of-service condition. Affected models include JetWave 4221 HP-E, 3220/3420 V3, 2212G, 2212X/2112S, 2211C, 2411/2111, 2411L/2111L, 2414/2114, 2424, and 2460 running versions prior to the fixed versions specified by Korenix.
- Authenticated network access to the JetWave management interface (HTTP/HTTPS port, typically 80 or 443)
- Valid username and password for the device
- Network path between attacker and device (internal network or remote access if enabled)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b56d710f-87b6-41ec-8d61-8f9a81183624Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.