The QSAN SANOS setting page does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-4890-39791-1.html | Third Party Advisory |
https://www.twcert.org.tw/tw/cp-132-4890-39791-1.html | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.twcert.org.tw/tw/cp-132-4890-39791-1.html - Third Party Advisory |
02 Aug 2021, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary | The QSAN SANOS setting page does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0. |
22 Jul 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
Summary | The QSAN SANOS setting page does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. Suggest contacting with QSAN and refer to recommendations in QSAN Document. |
08 Jul 2021, 21:11
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:qsan:sanos:*:*:*:*:*:*:*:* | |
CWE | CWE-78 | |
References | (CONFIRM) https://www.twcert.org.tw/tw/cp-132-4890-39791-1.html - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
07 Jul 2021, 15:08
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-07-07 14:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32533
Mitre link : CVE-2021-32533
CVE.ORG link : CVE-2021-32533
JSON object : View
Products Affected
qsan
- sanos
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')