CVE-2015-9266

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary files via directory traversal in Ubiquiti network devices' web management interface. Attackers can exploit this to gain root privileges on affected devices. All Ubiquiti airMAX, airFiber, airGateway, and EdgeSwitch XP devices running versions prior to July 2015 security updates are affected.

💻 Affected Systems

Products:
  • Ubiquiti airMAX
  • Ubiquiti airFiber
  • Ubiquiti airGateway
  • Ubiquiti EdgeSwitch XP (formerly TOUGHSwitch)
Versions: All versions prior to July 2015 security updates
Operating Systems: airOS firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Web management interface enabled by default on these devices. All configurations with web interface accessible are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise with root access, allowing attackers to install persistent backdoors, intercept network traffic, pivot to internal networks, or use devices for botnet participation.

🟠

Likely Case

Remote code execution leading to device takeover, configuration modification, credential theft, and network disruption.

🟢

If Mitigated

Limited impact if devices are behind firewalls with restricted web interface access and proper network segmentation.

🌐 Internet-Facing: HIGH - Directly exploitable from internet without authentication, CVSS 9.8 indicates critical risk for exposed devices.
🏢 Internal Only: HIGH - Even internally, unauthenticated exploitation allows lateral movement and network compromise.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB and HackerOne. Simple HTTP requests with directory traversal payloads can achieve root access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: airMAX AC 7.1.3; airMAX M (and airRouter) 5.6.2 XM/XW/TI, 5.5.11 XM/TI, and 5.5.10u2 XW; airGateway 1.1.5; airFiber AF24/AF24HD 2.2.1, AF5x 3.0.2.1, and AF5 2.2.1; airOS 4 XS2/XS5 4.0.4; EdgeSwitch XP 1.3.2

Vendor Advisory: https://community.ubnt.com/t5/airMAX-Updates-Blog/Important-Security-Notice-and-airOS-5-6-5-Release/ba-p/1565949

Restart Required: Yes

Instructions:

1. Log into device web interface. 2. Navigate to System > Upgrade. 3. Download appropriate firmware version from Ubiquiti downloads page. 4. Upload and apply firmware update. 5. Device will reboot automatically.

🔧 Temporary Workarounds

Disable Web Management Interface

all

Disable the vulnerable web interface and use alternative management methods

Use SSH/CLI to disable web interface: configure -> set service gui disable -> commit

Restrict Web Interface Access

linux

Limit access to web interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Place devices behind firewalls with strict inbound rules blocking all access to web management ports (80, 443, 8080)
  • Segment affected devices on isolated VLANs to prevent lateral movement if compromised

🔍 How to Verify

Check if Vulnerable:

Check current firmware version via web interface (System > Status) or SSH (show version). Compare with patched versions listed in advisory.

Check Version:

ssh admin@device_ip 'show version' or check web interface at System > Status

Verify Fix Applied:

Confirm firmware version matches or exceeds patched versions. Test web interface with directory traversal attempts (../) in file upload parameters.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' sequences in file upload parameters
  • Unauthenticated file upload attempts to web interface
  • Unexpected file creation in system directories

Network Indicators:

  • HTTP POST requests to /upload.cgi or similar endpoints with traversal sequences
  • Unusual outbound connections from network devices

SIEM Query:

source="ubiquiti_logs" AND (http_uri="*../*" OR http_post_data="*../*")

🔗 References

📤 Share & Export