cve/2021/CVE-2021-33550.md

37 lines
2.6 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-33550](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33550)
![](https://img.shields.io/static/v1?label=Product&message=E2%20Series&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Encoder%20G-Code&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=EBC-21xx%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EBC-21xx%201.12.13.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EBC-21xx%201.12.14.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EEC-2xx%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EEC-2xx%201.12.13.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EEC-2xx%201.12.14.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EEN-20xx%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EEN-20xx%201.12.13.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EEN-20xx%201.12.14.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EFD-22xx%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EFD-22xx%201.12.13.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EFD-22xx%201.12.14.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=ETHC-22xx%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=ETHC-22xx%201.12.13.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=ETHC-22xx%201.12.14.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EWPC-22xx%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EWPC-22xx%201.12.13.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=EWPC-22xx%201.12.14.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brightgreen)
2024-05-25 21:48:12 +02:00
### Description
Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.
### POC
#### Reference
- https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/ARPSyndicate/cve-scores
2024-05-25 21:48:12 +02:00
- https://github.com/ARPSyndicate/cvemon