Description
An unauthenticated command injection vulnerability exists in the parameters of operation 49 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-7601 | An unauthenticated command injection vulnerability exists in the parameters of operation 49 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending a specially crafted malicious packet to the controller_server service on port 9999. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2021-51 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-03T17:30:07.446Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2021-20144
No data.
Status : Modified
Published: 2021-12-09T16:15:08.077
Modified: 2024-11-21T05:46:00.443
Link: CVE-2021-20144
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD