From b7db8db2852b328da5e9ecccd56c10150d0b4aad Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Thu, 5 May 2022 13:22:41 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-21881.yaml by mp --- cves/2021/CVE-2021-21881.yaml | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/cves/2021/CVE-2021-21881.yaml b/cves/2021/CVE-2021-21881.yaml index 367e84dfbd..4dc66dd082 100644 --- a/cves/2021/CVE-2021-21881.yaml +++ b/cves/2021/CVE-2021-21881.yaml @@ -1,11 +1,10 @@ id: CVE-2021-21881 info: - name: Lantronix PremierWave 2050 - Remote Code Execution + name: Lantronix PremierWave 2050 8.9.0.0R4 - Remote Command Injection author: gy741 severity: critical - description: An OS command injection vulnerability exists in the Web Manager Wireless Network Scanner functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to command - execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. + description: Lantronix PremierWave 2050 8.9.0.0R4 contains an OS command injection vulnerability. A specially-crafted HTTP request can lead to command in the Web Manager Wireless Network Scanner. An attacker can make an authenticated HTTP request to trigger this vulnerability. reference: - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1325 - https://nvd.nist.gov/vuln/detail/CVE-2021-21881 @@ -39,3 +38,5 @@ requests: part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" + +# Enhanced by mp on 2022/05/05