QSAN SANOS factory reset function does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0.
References
Link Resource
https://www.twcert.org.tw/tw/cp-132-4891-94707-1.html Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: twcert

Published: 2021-07-07T00:00:00

Updated: 2021-07-22T10:33:04

Reserved: 2021-05-10T00:00:00


Link: CVE-2021-32534

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-07-07T14:15:12.030

Modified: 2021-09-20T12:37:19.197


Link: CVE-2021-32534

JSON object: View

cve-icon Redhat Information

No data.

CWE