Command Injection in Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted "action/umountUSBPartition" request. This occurs because the "formSetUSBPartitionUmount" function executes the "doSystemCmd" function with untrusted input.
References
Link | Resource |
---|---|
https://hackmd.io/%40aZYpdinUS2SD-yhAeHwOkw/ry-t4QfMu |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
12 Jul 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-119 |
Information
Published : 2021-04-16 00:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-27692
Mitre link : CVE-2021-27692
CVE.ORG link : CVE-2021-27692
JSON object : View
Products Affected
tendacn
- g3_firmware
- g1
- g3
- g1_firmware