** UNSUPPORTED WHEN ASSIGNED ** Emerson Dixell XWEB-500 products are affected by arbitrary file write vulnerability in /cgi-bin/logo_extra_upload.cgi, /cgi-bin/cal_save.cgi, and /cgi-bin/lo_utils.cgi. An attacker will be able to write any file on the target system without any kind of authentication mechanism, and this can lead to denial of service and potentially remote code execution. Note: the product has not been supported since 2018 and should be removed or replaced.
References
Link | Resource |
---|---|
http://dixell.com | Product |
http://emerson.com | Vendor Advisory |
https://www.swascan.com/emerson | Exploit Third Party Advisory |
http://dixell.com | Product |
http://emerson.com | Vendor Advisory |
https://www.swascan.com/emerson | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://dixell.com - Product | |
References | () http://emerson.com - Vendor Advisory | |
References | () https://www.swascan.com/emerson - Exploit, Third Party Advisory |
12 Jul 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-306 CWE-200 CWE-668 |
23 Feb 2022, 19:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:emerson:dixell_xweb-500:-:*:*:*:*:*:*:* cpe:2.3:o:emerson:dixell_xweb-500_firmware:-:*:*:*:*:*:*:* |
|
References | (MISC) http://emerson.com - Vendor Advisory | |
References | (MISC) http://dixell.com - Product | |
References | (MISC) https://www.swascan.com/emerson - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
CWE | CWE-287 |
14 Feb 2022, 14:52
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-14 14:15
Updated : 2024-11-21 06:32
NVD link : CVE-2021-45420
Mitre link : CVE-2021-45420
CVE.ORG link : CVE-2021-45420
JSON object : View
Products Affected
emerson
- dixell_xweb-500
- dixell_xweb-500_firmware