CVE-2021-28149
https://notcve.org/view.php?id=CVE-2021-28149
Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../.. • http://en.hongdian.com/Products/Details/H8922 https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2021-28150
https://notcve.org/view.php?id=CVE-2021-28150
Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi. Los dispositivos Hongdian H8922 versión 3.0.5, permiten al usuario invitado sin privilegios leer cli.conf (con la contraseña de administrador y otros datos confidenciales) por medio del archivo /backup2.cgi • http://en.hongdian.com/Products/Details/H8922 https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities • CWE-425: Direct Request ('Forced Browsing') •
CVE-2021-28152
https://notcve.org/view.php?id=CVE-2021-28152
Hongdian H8922 3.0.5 devices have an undocumented feature that allows access to a shell as a superuser. To connect, the telnet service is used on port 5188 with the default credentials of root:superzxmn. Los dispositivos Hongdian H8922 versión 3.0.5, presentan una función no documentada que permite el acceso a un shell como superusuario. Para conectarse, el servicio telnet es usado en el puerto 5188 con las credenciales predeterminadas root:superzxmn • http://en.hongdian.com/Products/Details/H8922 https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities • CWE-287: Improper Authentication •
CVE-2021-28151
https://notcve.org/view.php?id=CVE-2021-28151
Hongdian H8922 3.0.5 devices allow OS command injection via shell metacharacters into the ip-address (aka Destination) field to the tools.cgi ping command, which is accessible with the username guest and password guest. Los dispositivos Hongdian H8922 versión 3.0.5, permiten una inyección de comandos del sistema operativo por medio de metacaracteres de shell en el campo ip-address (también se conoce como Destination) para el comando ping tools.cgi, al que puede ser accesible con el nombre de usuario guest y la contraseña guest • http://en.hongdian.com/Products/Details/H8922 https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •