A conference management system of ZTE is impacted by a command execution vulnerability. Since the soapmonitor's java object service is enabled by default, the attacker could exploit this vulnerability to execute arbitrary commands by sending a deserialized payload to port 5001.
References
Link | Resource |
---|---|
https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1018424 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-08-30 11:15
Updated : 2021-09-07 07:04
NVD link : CVE-2021-21741
Mitre link : CVE-2021-21741
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
zte
- zxv10_m910
- zxv10_m910_firmware