AOS-10 AP Command Injection: CVE-2026-23823 Exposes Networks
The National Vulnerability Database has disclosed CVE-2026-23823, a high-severity command injection vulnerability impacting Access Points running AOS-10. This flaw, rated 7.2 CVSS, allows an authenticated remote attacker to execute arbitrary commands on the underlying operating system via the command-line interface. This isn’t just a theoretical risk; successful exploitation means an attacker gains deep control over your network infrastructure.
Crucially, this vulnerability specifically targets AOS-10.7.x.x and above. Organizations still running AOS-10.4 AP or AOS-8 Instant software branches are not affected, according to the National Vulnerability Database. This narrow scope is a double-edged sword: it simplifies patching for some, but for others, it means a critical patch is required for their latest hardware deployments.
Attackers will prioritize these devices. Gaining root on an access point provides a strategic beachhead into the internal network, enabling lateral movement, traffic sniffing, and potential for further compromise. This isn’t about defacing a webpage; it’s about owning the network’s on-ramp. CISOs need to treat this as an immediate threat to their network perimeter.
What This Means For You
- If your organization uses Access Points running AOS-10.7.x.x or above, you are exposed. Prioritize patching or implementing compensating controls immediately. Audit your AP logs for any unusual CLI access or command execution. Assume compromise until proven otherwise.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-23823 - AOS-10 AP Command Injection via CLI
title: CVE-2026-23823 - AOS-10 AP Command Injection via CLI
id: scw-2026-05-12-ai-1
status: experimental
level: critical
description: |
Detects the execution of shell commands on AOS-10 Access Points that are indicative of command injection attempts, specifically targeting CVE-2026-23823. This rule looks for common shell interpreters and command separators often used in injection payloads.
author: SCW Feed Engine (AI-generated)
date: 2026-05-12
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-23823/
tags:
- attack.execution
- attack.t1059.004
logsource:
category: process_creation
detection:
selection:
Image|contains:
- '/bin/sh'
- '/bin/bash'
CommandLine|contains:
- '&&'
- ';'
- '|'
- '$()'
- '`'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-23823 | Command Injection | Access Points running AOS-10 |
| CVE-2026-23823 | Command Injection | Access Points running AOS-10.7.x.x and above |
| CVE-2026-23823 | Command Injection | Command Line Interface (CLI) |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 12, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.