The QSAN SANOS setting page does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-4890-39791-1.html | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: twcert
Published: 2021-07-07T00:00:00
Updated: 2021-08-02T11:18:55
Reserved: 2021-05-10T00:00:00
Link: CVE-2021-32533
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-07-07T14:15:11.963
Modified: 2021-09-20T12:37:08.533
Link: CVE-2021-32533
JSON object: View
Redhat Information
No data.
CWE