ECOA BAS controller suffers from an arbitrary file write and path traversal vulnerability. Using the POST parameters, unauthenticated attackers can remotely set arbitrary values for location and content type and gain the possibility to execute arbitrary code on the affected device.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-5126-ca315-1.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Information
Published : 2021-09-30 04:15
Updated : 2022-10-21 10:46
NVD link : CVE-2021-41290
Mitre link : CVE-2021-41290
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
ecoa
- riskterminator
- riskbuster
- riskbuster_firmware
- ecs_router_controller-ecs
- ecs_router_controller-ecs_firmware