A malicious actor in Wi-Fi range of the affected product could leverage a vulnerability in the airMAX Wireless Protocol to achieve a remote code execution (RCE) within the affected product.
Affected Products:
airMAX AC (Version 8.7.20 and earlier)
airMAX M (Version 6.3.22 and earlier)
airFiber AF60-XG (Version 1.2.2 and earlier)
airFiber AF60 (Version 2.6.7 and earlier)
Mitigation:
Update your airMAX AC to Version 8.7.21 or later.
Update your airMAX M to Version 6.3.24 or later.
Update your airFiber AF60-XG to Version 1.2.3 or later.
Update your airFiber AF60 to Version 2.6.8 or later.
References
| Link | Resource |
|---|---|
| https://community.ui.com/releases/Security-Advisory-Bulletin-061-061/1e4fe5f8-29c7-4a7d-a518-01b1537983ba | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-08 17:15
Updated : 2026-01-14 21:06
NVD link : CVE-2026-21639
Mitre link : CVE-2026-21639
CVE.ORG link : CVE-2026-21639
JSON object : View
Products Affected
ui
- airmax_m
- airmax_ac_firmware
- airmax_m_firmware
- airfiber_af60
- airmax_ac
- airfiber_af60-xg
- airfiber_af60_firmware
- airfiber_af60-xg_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
