The QSAN SANOS setting page does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
References
Link Resource
https://www.twcert.org.tw/tw/cp-132-4890-39791-1.html Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: twcert

Published: 2021-07-07T00:00:00

Updated: 2021-08-02T11:18:55

Reserved: 2021-05-10T00:00:00


Link: CVE-2021-32533

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-07-07T14:15:11.963

Modified: 2021-09-20T12:37:08.533


Link: CVE-2021-32533

JSON object: View

cve-icon Redhat Information

No data.

CWE