Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 19 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tg8
Tg8 tg8 Firewall |
|
| CPEs | cpe:2.3:a:tg8:tg8_firewall:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Tg8
Tg8 tg8 Firewall |
Sat, 15 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Togrow
Togrow tg8 Firewall |
|
| Vendors & Products |
Togrow
Togrow tg8 Firewall |
Fri, 14 Nov 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TG8 Firewall contains a pre-authentication remote code execution vulnerability in the runphpcmd.php endpoint. The syscmd POST parameter is passed directly to a system command without validation and executed with root privileges. A remote, unauthenticated attacker can supply crafted values to execute arbitrary operating system commands as root, resulting in full device compromise. | |
| Title | TG8 Firewall Unauthenticated RCE via runphpcmd.php | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-18T16:20:30.649Z
Reserved: 2025-11-14T20:52:09.108Z
Link: CVE-2021-4470
Updated: 2025-11-18T16:20:21.654Z
Status : Deferred
Published: 2025-11-14T23:15:43.087
Modified: 2026-04-15T00:35:42.020
Link: CVE-2021-4470
No data.
OpenCVE Enrichment
Updated: 2025-11-15T22:07:38Z