Description
In Visual Tools DVR VX16 4.2.28.0, an unauthenticated attacker can achieve remote command execution via shell metacharacters in the cgi-bin/slogin/login.py User-Agent HTTP header.
References
Vendor Advisory
https://www.exploit-db.com/exploits/50098
ExploitThird Party AdvisoryVDB Entry
https://www.swascan.com/security-advisory-visual-tools-dvr-cve-2021-42071/
ExploitThird Party Advisory
Vendor Advisory
https://www.exploit-db.com/exploits/50098
ExploitThird Party AdvisoryVDB Entry
https://www.swascan.com/security-advisory-visual-tools-dvr-cve-2021-42071/
ExploitThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2021-10-07T15:15:08.453Z
4 years agoLast modified
2024-11-21T05:27:11.257Z
1 year ago