cve/2021/CVE-2021-33530.md
2024-06-18 02:51:15 +02:00

20 lines
1.2 KiB
Markdown

### [CVE-2021-33530](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33530)
![](https://img.shields.io/static/v1?label=Product&message=IE-WL(T)-BL-AP-CL-XX&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=IE-WL(T)-VL-AP-CL-XX&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=IE-WL-BL-AP-CL-EU%20(2536600000)%3C%3D%20V1.16.18%20(Build%2018081617)%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=IE-WL-VL-AP-BR-CL-EU%20(2536680000)%3C%3D%20V1.11.10%20(Build%2018122616)%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20OS%20Command%20Injection&color=brighgreen)
### Description
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability.
### POC
#### Reference
- https://cert.vde.com/en-us/advisories/vde-2021-026
#### Github
No PoCs found on GitHub currently.