An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an attacker may force the remote telnet server to believe that the user has already authenticated.
References
Link | Resource |
---|---|
https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chiyu-iot-devices#cve-2021-31251 | Exploit Third Party Advisory |
https://seguranca-informatica.pt/dancing-in-the-iot-chiyu-devices-vulnerable-to-remote-attacks/#.YLqK1KhKguU | Exploit Third Party Advisory |
https://www.chiyu-tech.com/msg/message-Firmware-update-87.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-06-04T20:25:52
Updated: 2021-06-04T20:25:52
Reserved: 2021-04-15T00:00:00
Link: CVE-2021-31251
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-06-04T21:15:07.517
Modified: 2021-06-08T18:46:54.350
Link: CVE-2021-31251
JSON object: View
Redhat Information
No data.
CWE