ECOA BAS controller suffers from an arbitrary file write and path traversal vulnerability. Using the POST parameters, unauthenticated attackers can remotely set arbitrary values for location and content type and gain the possibility to execute arbitrary code on the affected device.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-5126-ca315-1.html | Third Party Advisory |
https://www.twcert.org.tw/tw/cp-132-5126-ca315-1.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
History
21 Nov 2024, 06:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.twcert.org.tw/tw/cp-132-5126-ca315-1.html - Third Party Advisory |
21 Oct 2022, 17:46
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 |
07 Oct 2021, 18:11
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.twcert.org.tw/tw/cp-132-5126-ca315-1.html - Third Party Advisory | |
CPE | cpe:2.3:a:ecoa:riskterminator:-:*:*:*:*:*:*:* cpe:2.3:h:ecoa:riskbuster:-:*:*:*:*:*:*:* cpe:2.3:o:ecoa:riskbuster_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:ecoa:ecs_router_controller-ecs:-:*:*:*:*:*:*:* |
|
CWE | CWE-434 | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
30 Sep 2021, 11:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-30 11:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-41290
Mitre link : CVE-2021-41290
CVE.ORG link : CVE-2021-41290
JSON object : View
Products Affected
ecoa
- riskterminator
- ecs_router_controller-ecs_firmware
- riskbuster
- riskbuster_firmware
- ecs_router_controller-ecs