Description
An unauthenticated command injection vulnerability exists in multiple parameters in the Gryphon Tower router’s web interface at /cgi-bin/luci/rc. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the web interface.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-7595 | An unauthenticated command injection vulnerability exists in multiple parameters in the Gryphon Tower router’s web interface at /cgi-bin/luci/rc. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the web interface. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2021-51 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-03T17:30:07.492Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2021-20138
No data.
Status : Modified
Published: 2021-12-09T16:15:07.803
Modified: 2024-11-21T05:45:59.787
Link: CVE-2021-20138
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD