mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
20 lines
1.2 KiB
Markdown
20 lines
1.2 KiB
Markdown
### [CVE-2021-33530](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33530)
|
|
-BL-AP-CL-XX&color=blue)
|
|
-VL-AP-CL-XX&color=blue)
|
|
%3C%3D%20V1.16.18%20(Build%2018081617)%20&color=brighgreen)
|
|
%3C%3D%20V1.11.10%20(Build%2018122616)%20&color=brighgreen)
|
|

|
|
|
|
### Description
|
|
|
|
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://cert.vde.com/en-us/advisories/vde-2021-026
|
|
|
|
#### Github
|
|
No PoCs found on GitHub currently.
|
|
|