QSAN SANOS factory reset function does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-4891-94707-1.html | Third Party Advisory |
Configurations
Information
Published : 2021-07-07 07:15
Updated : 2021-09-20 05:37
NVD link : CVE-2021-32534
Mitre link : CVE-2021-32534
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
qsan
- sanos