10
CVE-2021-27692
- EPSS 3.25%
- Veröffentlicht 16.04.2021 00:15:12
- Zuletzt bearbeitet 21.11.2024 05:58:26
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Command Injection in Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted "action/umountUSBPartition" request. This occurs because the "formSetUSBPartitionUmount" function executes the "doSystemCmd" function with untrusted input.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Tendacn ≫ G1 Firmware Version15.11.0.16(9024)_cn
Tendacn ≫ G1 Firmware Version15.11.0.17(9502)_cn
Tendacn ≫ G3 Firmware Version15.11.0.16(9024)_cn
Tendacn ≫ G3 Firmware Version15.11.0.17(9502)_cn
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 3.25% | 0.866 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.