### [CVE-2021-46422](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46422) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen) ### Description Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication. ### POC #### Reference - http://packetstormsecurity.com/files/167201/SDT-CW3B1-1.1.0-Command-Injection.html - http://packetstormsecurity.com/files/167387/Telesquare-SDT-CW3B1-1.1.0-Command-Injection.html - https://drive.google.com/drive/folders/1YJlVlb4SlTEGONzIjiMwd2P7ucP_Pm7T?usp=sharing #### Github - https://github.com/12442RF/POC - https://github.com/20142995/nuclei-templates - https://github.com/20142995/pocsuite3 - https://github.com/5l1v3r1/CVE-2021-46422 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Awei507/CVE-RCE - https://github.com/CJ-0107/cve-2021-46422 - https://github.com/CJ-0107/cve-2022-26134 - https://github.com/Chocapikk/CVE-2021-46422 - https://github.com/DMW11525708/wiki - https://github.com/Lern0n/Lernon-POC - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/SYRTI/POC_to_review - https://github.com/StarCrossPortal/scalpel - https://github.com/WhooAmii/POC_to_review - https://github.com/ZAxyr/CVE-2021-46422 - https://github.com/adysec/POC - https://github.com/anonymous364872/Rapier_Tool - https://github.com/apif-review/APIF_tool_2024 - https://github.com/apit-review-account/apit-tool - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/eeeeeeeeee-code/POC - https://github.com/feierjiaxian/SDT-CW3B1-1.1.0---OS-Command-Injection - https://github.com/kailing0220/CVE-2021-46422 - https://github.com/kelemaoya/CVE-2021-46422 - https://github.com/laoa1573/wy876 - https://github.com/latings/CVE-2021-46422 - https://github.com/nobodyatall648/CVE-2021-46422 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/oLy0/Vulnerability - https://github.com/polerstar/CVE-2021-46422-poc - https://github.com/trhacknon/Pocingit - https://github.com/tucommenceapousser/CVE-2021-46422 - https://github.com/twoning/CVE-2021-46422_PoC - https://github.com/xanszZZ/SDT_CW3B1_rce - https://github.com/yigexioabai/CVE-2021-46422_RCE - https://github.com/youcans896768/APIV_Tool - https://github.com/yyqxi/CVE-2021-46422 - https://github.com/zecool/cve