### [CVE-2021-33544](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33544) ![](https://img.shields.io/static/v1?label=Product&message=E2%20Series&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Encoder%20G-Code&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=EBC-21xx%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EBC-21xx%201.12.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EBC-21xx%201.12.14.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EEC-2xx%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EEC-2xx%201.12.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EEC-2xx%201.12.14.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EEN-20xx%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EEN-20xx%201.12.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EEN-20xx%201.12.14.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EFD-22xx%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EFD-22xx%201.12.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EFD-22xx%201.12.14.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=ETHC-22xx%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=ETHC-22xx%201.12.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=ETHC-22xx%201.12.14.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EWPC-22xx%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EWPC-22xx%201.12.13.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=EWPC-22xx%201.12.14.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brightgreen) ### Description Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. ### POC #### Reference - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ #### Github - https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cve-scores - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates