CVE-2026-22562: CWE-22 Path Traversal in Ubiquiti Inc UniFi Play PowerAmp
CVE-2026-22562 is a critical path traversal vulnerability in Ubiquiti Inc's UniFi Play PowerAmp and UniFi Play Audio Port devices. An attacker with network access to the UniFi Play environment could exploit this flaw to write arbitrary files on the device, potentially enabling remote code execution. The vulnerability affects UniFi Play PowerAmp firmware version 1. 0. 35 and earlier, and UniFi Play Audio Port version 1. 0. 24 and earlier. Ubiquiti has released updates to address this issue: version 1. 0. 38 or later for UniFi Play PowerAmp and version 1.
AI Analysis
Technical Summary
This vulnerability (CVE-2026-22562) involves a path traversal flaw (CWE-22) in the firmware of Ubiquiti UniFi Play PowerAmp and UniFi Play Audio Port devices. Exploitation requires network access to the UniFi Play network and allows an attacker to write files arbitrarily on the device filesystem. Such file writes can be leveraged to achieve remote code execution. The issue affects firmware versions 1.0.35 and earlier for PowerAmp and 1.0.24 and earlier for Audio Port. Vendor-provided mitigation is to update to firmware versions 1.0.38+ and 1.1.9+ respectively. The vulnerability has a CVSS score of 9.8, reflecting its critical impact and ease of exploitation without privileges or user interaction.
Potential Impact
Successful exploitation allows an unauthenticated attacker with network access to write arbitrary files on the affected devices, potentially leading to remote code execution. This can compromise device confidentiality, integrity, and availability, posing a critical risk to the UniFi Play network environment.
Mitigation Recommendations
Ubiquiti has released firmware updates that address this vulnerability. Users should update UniFi Play PowerAmp devices to version 1.0.38 or later and UniFi Play Audio Port devices to version 1.1.9 or later. Applying these updates mitigates the vulnerability. No other mitigation guidance is provided or required by the vendor.
CVE-2026-22562: CWE-22 Path Traversal in Ubiquiti Inc UniFi Play PowerAmp
Description
CVE-2026-22562 is a critical path traversal vulnerability in Ubiquiti Inc's UniFi Play PowerAmp and UniFi Play Audio Port devices. An attacker with network access to the UniFi Play environment could exploit this flaw to write arbitrary files on the device, potentially enabling remote code execution. The vulnerability affects UniFi Play PowerAmp firmware version 1. 0. 35 and earlier, and UniFi Play Audio Port version 1. 0. 24 and earlier. Ubiquiti has released updates to address this issue: version 1. 0. 38 or later for UniFi Play PowerAmp and version 1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability (CVE-2026-22562) involves a path traversal flaw (CWE-22) in the firmware of Ubiquiti UniFi Play PowerAmp and UniFi Play Audio Port devices. Exploitation requires network access to the UniFi Play network and allows an attacker to write files arbitrarily on the device filesystem. Such file writes can be leveraged to achieve remote code execution. The issue affects firmware versions 1.0.35 and earlier for PowerAmp and 1.0.24 and earlier for Audio Port. Vendor-provided mitigation is to update to firmware versions 1.0.38+ and 1.1.9+ respectively. The vulnerability has a CVSS score of 9.8, reflecting its critical impact and ease of exploitation without privileges or user interaction.
Potential Impact
Successful exploitation allows an unauthenticated attacker with network access to write arbitrary files on the affected devices, potentially leading to remote code execution. This can compromise device confidentiality, integrity, and availability, posing a critical risk to the UniFi Play network environment.
Mitigation Recommendations
Ubiquiti has released firmware updates that address this vulnerability. Users should update UniFi Play PowerAmp devices to version 1.0.38 or later and UniFi Play Audio Port devices to version 1.1.9 or later. Applying these updates mitigates the vulnerability. No other mitigation guidance is provided or required by the vendor.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2026-01-07T15:39:03.440Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69dd644b82d89c981f67c50d
Added to database: 4/13/2026, 9:46:51 PM
Last enriched: 4/13/2026, 10:02:18 PM
Last updated: 4/14/2026, 10:03:06 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.