CVE-2021-41426
https://notcve.org/view.php?id=CVE-2021-41426
Beeline Smart box 2.0.38 is vulnerable to Cross Site Request Forgery (CSRF) via mgt_end_user.htm. Beeline Smart box versión 2.0.38, es vulnerable a un ataque de tipo Cross Site Request Forgery (CSRF) por medio de el archivo mgt_end_user.htm • https://tula.beeline.ru/customers/pomosh/home/domashnij-internet/nastrojki-s-routerom/beelinesmartbox https://youtu.be/HL73yOW7YWU?t=540 https://youtu.be/WtcyIVImcwc • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2021-41427
https://notcve.org/view.php?id=CVE-2021-41427
Beeline Smart Box 2.0.38 is vulnerable to Cross Site Scripting (XSS) via the choose_mac parameter to setup.cgi. Beeline Smart Box versión 2.0.38, es vulnerable a un ataque de tipo Cross Site Scripting (XSS) por medio del parámetro choose_mac del archivo setup.cgi • https://tula.beeline.ru/customers/pomosh/home/domashnij-internet/nastrojki-s-routerom/beelinesmartbox https://youtu.be/CbWI-JQteRo https://youtu.be/HL73yOW7YWU?t=520 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2020-12246
https://notcve.org/view.php?id=CVE-2020-12246
Beeline Smart Box 2.0.38 routers allow "Advanced settings > Other > Diagnostics" OS command injection via the Ping ping_ipaddr parameter, the Nslookup nslookup_ipaddr parameter, or the Traceroute traceroute_ipaddr parameter. Los routers Beeline Smart Box versión 2.0.38, permiten una inyección de comando del Sistema Operativo de "Advanced settings ) Other ) Diagnostics" por medio del parámetro Ping ping_ipaddr, el parámetro Nslookup nslookup_ipaddr, o el parámetro Traceroute traceroute_ipaddr. • https://medium.com/%40Pavel.Step/security-analysis-of-the-smart-box-router-932f86dc8a9e https://yadi.sk/i/YdfXr-ofAN2ZWA https://yadi.sk/i/iIUCJVaGEuSaAw https://yadi.sk/i/jXV87yn4ZJfSHA • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •