A malicious actor in Wi-Fi range of the affected product could leverage a vulnerability in the airMAX Wireless Protocol to achieve a remote code execution (RCE) within the affected product.
Affected Products:
UBB-XG (Version 1.2.2 and earlier)
UDB-Pro/UDB-Pro-Sector (Version 1.4.1 and earlier)
UBB (Version 3.1.5 and earlier)
Mitigation:
Update your UBB-XG to Version 1.2.3 or later.
Update your UDB-Pro/UDB-Pro-Sector to Version 1.4.2 or later.
Update your UBB to Version 3.1.7 or later.
References
| Link | Resource |
|---|---|
| https://community.ui.com/releases/Security-Advisory-Bulletin-060-060/cde18da7-2bc4-41bb-a9cc-48a4a4c479c1 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-08 17:15
Updated : 2026-01-14 21:06
NVD link : CVE-2026-21638
Mitre link : CVE-2026-21638
CVE.ORG link : CVE-2026-21638
JSON object : View
Products Affected
ui
- ubb_firmware
- ubb-xg_firmware
- udb-pro-sector_firmware
- udb-pro-sector
- udb-pro
- udb-pro_firmware
- ubb-xg
- ubb
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
