A local file inclusion (LFI) vulnerability exists in the options.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary PHP code execution. An attacker can send a crafted HTTP request to trigger this vulnerability.
References
| Link | Resource |
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2021-1273 | Exploit Third Party Advisory |
| https://talosintelligence.com/vulnerability_reports/TALOS-2021-1273 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:49
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2021-1273 - Exploit, Third Party Advisory |
28 Jul 2021, 20:26
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:advantech:r-seenet:2.4.12:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
| References | (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2021-1273 - Exploit, Third Party Advisory | |
| CWE | CWE-829 |
16 Jul 2021, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-07-16 11:15
Updated : 2024-11-21 05:49
NVD link : CVE-2021-21804
Mitre link : CVE-2021-21804
CVE.ORG link : CVE-2021-21804
JSON object : View
Products Affected
advantech
- r-seenet
