CVE-2021-20122

The Telus Wi-Fi Hub (PRV65B444A-S-TS) with firmware version 3.00.20 is affected by an authenticated command injection vulnerability in multiple parameters passed to tr69_cmd.cgi. A remote attacker connected to the router's LAN and authenticated with a super user account, or using a bypass authentication vulnerability like CVE-2021-20090 could leverage this issue to run commands or gain a shell as root on the target device.
References
Link Resource
https://www.tenable.com/security/research/tra-2021-41 Exploit Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:telus:prv65b444a-s-ts_firmware:3.00.20:*:*:*:*:*:*:*
cpe:2.3:h:telus:prv65b444a-s-ts:-:*:*:*:*:*:*:*

Information

Published : 2021-10-11 10:15

Updated : 2021-10-18 11:39


NVD link : CVE-2021-20122

Mitre link : CVE-2021-20122


JSON object : View

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

Advertisement

dedicated server usa

Products Affected

telus

  • prv65b444a-s-ts_firmware
  • prv65b444a-s-ts