CVE-2021-20122

The Telus Wi-Fi Hub (PRV65B444A-S-TS) with firmware version 3.00.20 is affected by an authenticated command injection vulnerability in multiple parameters passed to tr69_cmd.cgi. A remote attacker connected to the router's LAN and authenticated with a super user account, or using a bypass authentication vulnerability like CVE-2021-20090 could leverage this issue to run commands or gain a shell as root on the target device.
References
Link Resource
https://www.tenable.com/security/research/tra-2021-41 Exploit Third Party Advisory
https://www.tenable.com/security/research/tra-2021-41 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:telus:prv65b444a-s-ts_firmware:3.00.20:*:*:*:*:*:*:*
cpe:2.3:h:telus:prv65b444a-s-ts:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:45

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2021-41 - Exploit, Third Party Advisory () https://www.tenable.com/security/research/tra-2021-41 - Exploit, Third Party Advisory

Information

Published : 2021-10-11 17:15

Updated : 2024-11-21 05:45


NVD link : CVE-2021-20122

Mitre link : CVE-2021-20122

CVE.ORG link : CVE-2021-20122


JSON object : View

Products Affected

telus

  • prv65b444a-s-ts
  • prv65b444a-s-ts_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')