CVE-2021-45401

A Command injection vulnerability exists in Tenda AC10U AC1200 Smart Dual-band Wireless Router AC10U V1.0 Firmware V15.03.06.49_multi via the setUsbUnload functionality. The vulnerability is caused because the client controlled "deviceName" value is passed directly to the "doSystemCmd" function.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.49_multi:*:*:*:*:*:*:*
cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*

History

28 Feb 2022, 19:39

Type Values Removed Values Added
CPE cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.49_multi:*:*:*:*:*:*:*
cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
References (MISC) https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/Tenda_AC10U_command_injection_RCE.pdf - (MISC) https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/Tenda_AC10U_command_injection_RCE.pdf - Exploit, Third Party Advisory
CWE CWE-77

18 Feb 2022, 18:33

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-18 18:15

Updated : 2024-02-04 22:29


NVD link : CVE-2021-45401

Mitre link : CVE-2021-45401

CVE.ORG link : CVE-2021-45401


JSON object : View

Products Affected

tendacn

  • ac10u
  • ac10u_firmware
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')