CVE-2021-27691
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Command Injection in Tenda G0 routers with firmware versions v15.11.0.6(9039)_CN and v15.11.0.5(5876)_CN , and Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted action/setDebugCfg request. This occurs because the "formSetDebugCfg" function executes glibc's system function with untrusted input.
Una Inyección de Comandos en routers Tenda G0 con versiones de firmware v15.11.0.6 (9039) _CN y v15.11.0.5(5876) _CN, y routers Tenda G1 y G3 con versiones de firmware v15.11.0.17(9502) _CN o v15. 11.0.16(9024) _CN, permite a atacantes remotos ejecutar comandos arbitrarios del sistema operativo a través de una petición action/setDebugCfg deseñada. Esto ocurre porque la función "formSetDebugCfg" ejecuta la función del sistema de glibc con una entrada que no es de confianza
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-02-25 CVE Reserved
- 2021-04-15 CVE Published
- 2023-12-30 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://hackmd.io/%40aZYpdinUS2SD-yhAeHwOkw/rkhTCGzMd | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tendacn Search vendor "Tendacn" | G0 Firmware Search vendor "Tendacn" for product "G0 Firmware" | 15.11.0.5\(5876\)_cn Search vendor "Tendacn" for product "G0 Firmware" and version "15.11.0.5\(5876\)_cn" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | G0 Search vendor "Tendacn" for product "G0" | - | - |
Safe
|
Tendacn Search vendor "Tendacn" | G0 Firmware Search vendor "Tendacn" for product "G0 Firmware" | 15.11.0.6\(9039\)_cn Search vendor "Tendacn" for product "G0 Firmware" and version "15.11.0.6\(9039\)_cn" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | G0 Search vendor "Tendacn" for product "G0" | - | - |
Safe
|
Tendacn Search vendor "Tendacn" | G1 Firmware Search vendor "Tendacn" for product "G1 Firmware" | 15.11.0.16\(9024\)_cn Search vendor "Tendacn" for product "G1 Firmware" and version "15.11.0.16\(9024\)_cn" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | G1 Search vendor "Tendacn" for product "G1" | - | - |
Safe
|
Tendacn Search vendor "Tendacn" | G1 Firmware Search vendor "Tendacn" for product "G1 Firmware" | 15.11.0.17\(9502\)_cn Search vendor "Tendacn" for product "G1 Firmware" and version "15.11.0.17\(9502\)_cn" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | G1 Search vendor "Tendacn" for product "G1" | - | - |
Safe
|
Tendacn Search vendor "Tendacn" | G3 Firmware Search vendor "Tendacn" for product "G3 Firmware" | 15.11.0.16\(9024\)_cn Search vendor "Tendacn" for product "G3 Firmware" and version "15.11.0.16\(9024\)_cn" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | G3 Search vendor "Tendacn" for product "G3" | - | - |
Safe
|
Tendacn Search vendor "Tendacn" | G3 Firmware Search vendor "Tendacn" for product "G3 Firmware" | 15.11.0.17\(9502\)_cn Search vendor "Tendacn" for product "G3 Firmware" and version "15.11.0.17\(9502\)_cn" | - |
Affected
| in | Tendacn Search vendor "Tendacn" | G3 Search vendor "Tendacn" for product "G3" | - | - |
Safe
|