### [CVE-2021-27102](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27102) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description Accellion FTA 9_12_411 and earlier is affected by OS command execution via a local web service call. The fixed version is FTA_9_12_416 and later. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cve-scores - https://github.com/ChalkingCode/ExploitedDucks - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/Th0m4s-J4m3s/RSA-Ransomware-for-education- - https://github.com/accellion/CVEs - https://github.com/dudacgf/ovr_convert - https://github.com/eeenvik1/scripts_for_YouTrack - https://github.com/jaychen2/NIST-BULK-CVE-Lookup - https://github.com/takumakume/dependency-track-policy-applier - https://github.com/triw0lf/Security-Matters-22