Description
In Visual Tools DVR VX16 4.2.28.0, an unauthenticated attacker can achieve remote command execution via shell metacharacters in the cgi-bin/slogin/login.py User-Agent HTTP header.
References
Vendor Advisory
https://www.exploit-db.com/exploits/50098
ExploitThird Party AdvisoryVDB Entry
https://www.swascan.com/security-advisory-visual-tools-dvr-cve-2021-42071/
ExploitThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2021-10-07T17:15:08.453
3 years agoLast modified
2021-10-15T16:11:36.727
3 years ago