Vulnerability Details : CVE-2021-27692
Command Injection in Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted "action/umountUSBPartition" request. This occurs because the "formSetUSBPartitionUmount" function executes the "doSystemCmd" function with untrusted input.
Vulnerability category: Overflow
Products affected by CVE-2021-27692
- cpe:2.3:o:tendacn:g1_firmware:15.11.0.16\(9024\)_cn:*:*:*:*:*:*:*
- cpe:2.3:o:tendacn:g1_firmware:15.11.0.17\(9502\)_cn:*:*:*:*:*:*:*
- cpe:2.3:o:tendacn:g3_firmware:15.11.0.16\(9024\)_cn:*:*:*:*:*:*:*
- cpe:2.3:o:tendacn:g3_firmware:15.11.0.17\(9502\)_cn:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-27692
0.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-27692
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2021-27692
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-27692
-
https://hackmd.io/@aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu
Exploit;Third Party Advisory
Jump to