Логотип exploitDog
bind:CVE-2021-38703
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-38703

Количество 2

Количество 2

nvd логотип

CVE-2021-38703

больше 4 лет назад

Wireless devices running certain Arcadyan-derived firmware (such as KPN Experia WiFi 1.00.15) do not properly sanitise user input to the syslog configuration form. An authenticated remote attacker could leverage this to alter the device configuration and achieve remote code execution. This can be exploited in conjunction with CVE-2021-20090.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-c387-pvvx-p3vq

больше 3 лет назад

Wireless devices running certain Arcadyan-derived firmware (such as KPN Experia WiFi 1.00.15) do not properly sanitise user input to the syslog configuration form. An authenticated remote attacker could leverage this to alter the device configuration and achieve remote code execution. This can be exploited in conjunction with CVE-2021-20090.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-38703

Wireless devices running certain Arcadyan-derived firmware (such as KPN Experia WiFi 1.00.15) do not properly sanitise user input to the syslog configuration form. An authenticated remote attacker could leverage this to alter the device configuration and achieve remote code execution. This can be exploited in conjunction with CVE-2021-20090.

CVSS3: 8.8
6%
Низкий
больше 4 лет назад
github логотип
GHSA-c387-pvvx-p3vq

Wireless devices running certain Arcadyan-derived firmware (such as KPN Experia WiFi 1.00.15) do not properly sanitise user input to the syslog configuration form. An authenticated remote attacker could leverage this to alter the device configuration and achieve remote code execution. This can be exploited in conjunction with CVE-2021-20090.

CVSS3: 8.8
6%
Низкий
больше 3 лет назад

Уязвимостей на страницу