8
CVE-2021-20859
- EPSS 0.33%
- Veröffentlicht 01.12.2021 03:15:07
- Zuletzt bearbeitet 21.11.2024 05:47:17
- Quelle vultures@jpcert.or.jp
- CVE-Watchlists
- Unerledigt
ELECOM LAN routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent authenticated attacker to execute an arbitrary OS command via unspecified vectors.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Elecom ≫ Wrc-1167gst2 Firmware Version <= 1.25
Elecom ≫ Wrc-1167gst2a Firmware Version <= 1.25
Elecom ≫ Wrc-1167gst2h Firmware Version <= 1.25
Elecom ≫ Wrc-2533gs2-b Firmware Version <= 1.52
Elecom ≫ Wrc-2533gs2-w Firmware Version <= 1.52
Elecom ≫ Wrc-1750gs Firmware Version <= 1.03
Elecom ≫ Wrc-1750gsv Firmware Version <= 2.11
Elecom ≫ Wrc-1900gst Firmware Version <= 1.03
Elecom ≫ Wrc-2533gst Firmware Version <= 1.03
Elecom ≫ Wrc-2533gst2 Firmware Version <= 1.25
Elecom ≫ Wrc-2533gsta Firmware Version <= 1.03
Elecom ≫ Wrc-2533gst2sp Firmware Version <= 1.25
Elecom ≫ Wrc-2533gst2-g Firmware Version <= 1.25
Elecom ≫ Edwrc-2533gst2 Firmware Version <= 1.25
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.33% | 0.525 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8 | 2.1 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.7 | 5.1 | 10 |
AV:A/AC:L/Au:S/C:C/I:C/A:C
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.